committed by
GitHub
350 changed files with 30487 additions and 20146 deletions
@ -0,0 +1,3 @@ |
|||
@echo off |
|||
powershell -ExecutionPolicy ByPass -NoProfile -command "& """%~dp0eng\common\Build.ps1""" -restore -build %*" |
|||
exit /b %ErrorLevel% |
|||
@ -0,0 +1,49 @@ |
|||
<Project> |
|||
|
|||
<Import Project="Sdk.props" Sdk="Microsoft.DotNet.Arcade.Sdk" /> |
|||
|
|||
<PropertyGroup> |
|||
<LangVersion>preview</LangVersion> |
|||
<NoWarn>$(NoWarn);CS1591</NoWarn> |
|||
<TreatWarningsAsErrors>true</TreatWarningsAsErrors> |
|||
<DebugSymbols>true</DebugSymbols> |
|||
<AssemblyOriginatorKeyFile>$(MSBuildThisFileDirectory)\eng\key.snk</AssemblyOriginatorKeyFile> |
|||
<SignAssembly>true</SignAssembly> |
|||
<PublicSign Condition=" '$(OS)' != 'Windows_NT' ">true</PublicSign> |
|||
</PropertyGroup> |
|||
|
|||
<PropertyGroup> |
|||
<Authors>Kévin Chalet</Authors> |
|||
<Product>OpenIddict</Product> |
|||
<Copyright>© Kévin Chalet. All rights reserved.</Copyright> |
|||
<PackageIconUrl>https://avatars3.githubusercontent.com/u/13908567?s=64</PackageIconUrl> |
|||
<PackageProjectUrl>https://github.com/openiddict/openiddict-core</PackageProjectUrl> |
|||
<PackageLicenseExpression>Apache-2.0</PackageLicenseExpression> |
|||
<PackageTags>authentication;jwt;openidconnect;openiddict;security</PackageTags> |
|||
<RepositoryType>git</RepositoryType> |
|||
<RepositoryUrl>git://github.com/openiddict/openiddict-core</RepositoryUrl> |
|||
</PropertyGroup> |
|||
|
|||
<PropertyGroup> |
|||
<RepoRelativeProjectDir>$([MSBuild]::MakeRelative($(RepoRoot), $(MSBuildProjectDirectory)))</RepoRelativeProjectDir> |
|||
<WarnOnPackingNonPackableProject>false</WarnOnPackingNonPackableProject> |
|||
</PropertyGroup> |
|||
|
|||
<PropertyGroup Condition=" $(RepoRelativeProjectDir.Contains('src')) "> |
|||
<GenerateDocumentationFile>true</GenerateDocumentationFile> |
|||
<IncludeSource>true</IncludeSource> |
|||
<IncludeSymbols>true</IncludeSymbols> |
|||
<IsPackable>true</IsPackable> |
|||
<IsShipping>true</IsShipping> |
|||
</PropertyGroup> |
|||
|
|||
<ItemGroup Condition=" '$(OS)' != 'Windows_NT' "> |
|||
<PackageReference Include="Microsoft.NETFramework.ReferenceAssemblies" PrivateAssets="All" Version="1.0.0-preview.2" /> |
|||
</ItemGroup> |
|||
|
|||
<ItemGroup> |
|||
<ProjectCapability Include="DynamicDependentFile" /> |
|||
<ProjectCapability Include="DynamicFileNesting" /> |
|||
</ItemGroup> |
|||
|
|||
</Project> |
|||
@ -0,0 +1,5 @@ |
|||
<Project> |
|||
|
|||
<Import Project="Sdk.targets" Sdk="Microsoft.DotNet.Arcade.Sdk" /> |
|||
|
|||
</Project> |
|||
@ -1,7 +1,9 @@ |
|||
<?xml version="1.0" encoding="utf-8"?> |
|||
<configuration> |
|||
<packageSources> |
|||
<add key="NuGet" value="https://api.nuget.org/v3/index.json" /> |
|||
<add key="aspnet-contrib" value="https://www.myget.org/F/aspnet-contrib/api/v3/index.json" /> |
|||
<add key="nuget" value="https://api.nuget.org/v3/index.json" /> |
|||
<add key="arcade" value="https://dotnetfeed.blob.core.windows.net/dotnet-tools-internal/index.json" /> |
|||
<add key="dotnet-core" value="https://dotnetfeed.blob.core.windows.net/dotnet-core/index.json" /> |
|||
<add key="azureadwebstacknightly" value="https://www.myget.org/F/azureadwebstacknightly/api/v3/index.json" /> |
|||
</packageSources> |
|||
</configuration> |
|||
@ -1,2 +0,0 @@ |
|||
@ECHO OFF |
|||
PowerShell -NoProfile -NoLogo -ExecutionPolicy unrestricted -Command "[System.Threading.Thread]::CurrentThread.CurrentCulture = ''; [System.Threading.Thread]::CurrentThread.CurrentUICulture = '';& '%~dp0run.ps1' default-build %*; exit $LASTEXITCODE" |
|||
@ -1,67 +0,0 @@ |
|||
$ErrorActionPreference = "Stop" |
|||
|
|||
function DownloadWithRetry([string] $url, [string] $downloadLocation, [int] $retries) |
|||
{ |
|||
while($true) |
|||
{ |
|||
try |
|||
{ |
|||
Invoke-WebRequest $url -OutFile $downloadLocation |
|||
break |
|||
} |
|||
catch |
|||
{ |
|||
$exceptionMessage = $_.Exception.Message |
|||
Write-Host "Failed to download '$url': $exceptionMessage" |
|||
if ($retries -gt 0) { |
|||
$retries-- |
|||
Write-Host "Waiting 10 seconds before retrying. Retries left: $retries" |
|||
Start-Sleep -Seconds 10 |
|||
|
|||
} |
|||
else |
|||
{ |
|||
$exception = $_.Exception |
|||
throw $exception |
|||
} |
|||
} |
|||
} |
|||
} |
|||
|
|||
cd $PSScriptRoot |
|||
|
|||
$repoFolder = $PSScriptRoot |
|||
$env:REPO_FOLDER = $repoFolder |
|||
|
|||
$koreBuildZip="https://github.com/aspnet/KoreBuild/archive/dev.zip" |
|||
if ($env:KOREBUILD_ZIP) |
|||
{ |
|||
$koreBuildZip=$env:KOREBUILD_ZIP |
|||
} |
|||
|
|||
$buildFolder = ".build" |
|||
$buildFile="$buildFolder\KoreBuild.ps1" |
|||
|
|||
if (!(Test-Path $buildFolder)) { |
|||
Write-Host "Downloading KoreBuild from $koreBuildZip" |
|||
|
|||
$tempFolder=$env:TEMP + "\KoreBuild-" + [guid]::NewGuid() |
|||
New-Item -Path "$tempFolder" -Type directory | Out-Null |
|||
|
|||
$localZipFile="$tempFolder\korebuild.zip" |
|||
|
|||
DownloadWithRetry -url $koreBuildZip -downloadLocation $localZipFile -retries 6 |
|||
|
|||
Add-Type -AssemblyName System.IO.Compression.FileSystem |
|||
[System.IO.Compression.ZipFile]::ExtractToDirectory($localZipFile, $tempFolder) |
|||
|
|||
New-Item -Path "$buildFolder" -Type directory | Out-Null |
|||
copy-item "$tempFolder\**\build\*" $buildFolder -Recurse |
|||
|
|||
# Cleanup |
|||
if (Test-Path $tempFolder) { |
|||
Remove-Item -Recurse -Force $tempFolder |
|||
} |
|||
} |
|||
|
|||
&"$buildFile" @args |
|||
@ -1,8 +1,16 @@ |
|||
#!/usr/bin/env bash |
|||
|
|||
set -euo pipefail |
|||
DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )" |
|||
source="${BASH_SOURCE[0]}" |
|||
|
|||
# Call "sync" between "chmod" and execution to prevent "text file busy" error in Docker (aufs) |
|||
chmod +x "$DIR/run.sh"; sync |
|||
"$DIR/run.sh" default-build "$@" |
|||
# resolve $SOURCE until the file is no longer a symlink |
|||
while [[ -h $source ]]; do |
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
source="$(readlink "$source")" |
|||
|
|||
# if $source was a relative symlink, we need to resolve it relative to the path where the |
|||
# symlink file was located |
|||
[[ $source != /* ]] && source="$scriptroot/$source" |
|||
done |
|||
|
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
"$scriptroot/eng/common/build.sh" --build --restore $@ |
|||
|
|||
@ -1,25 +0,0 @@ |
|||
<Project> |
|||
|
|||
<Import Project="dependencies.props" /> |
|||
<Import Project="version.props" /> |
|||
|
|||
<PropertyGroup> |
|||
<LangVersion>latest</LangVersion> |
|||
<NoWarn>$(NoWarn);CS1591</NoWarn> |
|||
<TreatWarningsAsErrors>true</TreatWarningsAsErrors> |
|||
<DebugSymbols>true</DebugSymbols> |
|||
<DebugType>full</DebugType> |
|||
<DebugType Condition=" '$(Configuration)' != 'Debug' ">pdbonly</DebugType> |
|||
<DebugType Condition=" '$(OS)' != 'Windows_NT' ">portable</DebugType> |
|||
<AssemblyOriginatorKeyFile>$(MSBuildThisFileDirectory)key.snk</AssemblyOriginatorKeyFile> |
|||
<SignAssembly>true</SignAssembly> |
|||
<PublicSign Condition=" '$(OS)' != 'Windows_NT' ">true</PublicSign> |
|||
</PropertyGroup> |
|||
|
|||
<Target Name="WorkaroundAppConfigPathTooLong" BeforeTargets="GenerateBindingRedirects"> |
|||
<PropertyGroup> |
|||
<_GenerateBindingRedirectsIntermediateAppConfig>$(IntermediateOutputPath)$(TargetFileName).config</_GenerateBindingRedirectsIntermediateAppConfig> |
|||
</PropertyGroup> |
|||
</Target> |
|||
|
|||
</Project> |
|||
@ -1,26 +0,0 @@ |
|||
<Project> |
|||
|
|||
<PropertyGroup Label="Package Versions"> |
|||
<AspNetContribOpenIdExtensionsVersion>2.0.0</AspNetContribOpenIdExtensionsVersion> |
|||
<AspNetContribOpenIdServerVersion>2.0.0</AspNetContribOpenIdServerVersion> |
|||
<AspNetCoreVersion>2.0.0</AspNetCoreVersion> |
|||
<CoreFxVersion>4.4.0</CoreFxVersion> |
|||
<CryptoHelperVersion>3.0.2</CryptoHelperVersion> |
|||
<DataAnnotationsVersion>4.4.0</DataAnnotationsVersion> |
|||
<EntityFrameworkVersion>6.1.3</EntityFrameworkVersion> |
|||
<JetBrainsVersion>2018.2.1</JetBrainsVersion> |
|||
<JsonNetVersion>10.0.2</JsonNetVersion> |
|||
<JsonNetBsonVersion>1.0.1</JsonNetBsonVersion> |
|||
<ImmutableCollectionsVersion>1.5.0</ImmutableCollectionsVersion> |
|||
<MongoDbVersion>2.7.0</MongoDbVersion> |
|||
<MoqVersion>4.7.63</MoqVersion> |
|||
<NetStandardImplicitPackageVersion>2.0.0</NetStandardImplicitPackageVersion> |
|||
<NetStandardLibraryNetFrameworkVersion>2.0.0</NetStandardLibraryNetFrameworkVersion> |
|||
<NHibernateVersion>5.2.2</NHibernateVersion> |
|||
<RuntimeFrameworkVersion>2.0.0</RuntimeFrameworkVersion> |
|||
<TasksExtensionsVersion>4.4.0</TasksExtensionsVersion> |
|||
<TestSdkVersion>15.3.0</TestSdkVersion> |
|||
<XunitVersion>2.3.1</XunitVersion> |
|||
</PropertyGroup> |
|||
|
|||
</Project> |
|||
@ -1,20 +0,0 @@ |
|||
<Project> |
|||
|
|||
<Import Project="common.props" /> |
|||
|
|||
<PropertyGroup> |
|||
<GenerateDocumentationFile>true</GenerateDocumentationFile> |
|||
<IncludeSource>true</IncludeSource> |
|||
<IncludeSymbols>true</IncludeSymbols> |
|||
</PropertyGroup> |
|||
|
|||
<PropertyGroup> |
|||
<Product>OpenIddict</Product> |
|||
<PackageIconUrl>https://avatars3.githubusercontent.com/u/13908567?s=64</PackageIconUrl> |
|||
<PackageProjectUrl>https://github.com/openiddict/openiddict-core</PackageProjectUrl> |
|||
<PackageLicenseUrl>http://www.apache.org/licenses/LICENSE-2.0.html</PackageLicenseUrl> |
|||
<RepositoryType>git</RepositoryType> |
|||
<RepositoryUrl>git://github.com/openiddict/openiddict-core</RepositoryUrl> |
|||
</PropertyGroup> |
|||
|
|||
</Project> |
|||
@ -1,7 +0,0 @@ |
|||
<Project> |
|||
|
|||
<ItemGroup> |
|||
<ExcludeFromTest Include="$(RepositoryRoot)test\OpenIddict.EntityFramework.Tests\*.csproj" Condition="'$(OS)' != 'Windows_NT'"/> |
|||
</ItemGroup> |
|||
|
|||
</Project> |
|||
@ -1,9 +0,0 @@ |
|||
<Project> |
|||
|
|||
<PropertyGroup> |
|||
<VersionPrefix>3.0.0</VersionPrefix> |
|||
<VersionSuffix>alpha1</VersionSuffix> |
|||
<VersionSuffix Condition=" '$(VersionSuffix)' != '' AND '$(BuildNumber)' != '' ">$(VersionSuffix)-$(BuildNumber)</VersionSuffix> |
|||
</PropertyGroup> |
|||
|
|||
</Project> |
|||
@ -0,0 +1,13 @@ |
|||
<Project> |
|||
|
|||
<PropertyGroup> |
|||
<AllowEmptySignList>true</AllowEmptySignList> |
|||
</PropertyGroup> |
|||
|
|||
<ItemGroup> |
|||
<ItemsToSign Remove="@(ItemsToSign)" /> |
|||
<StrongNameSignInfo Remove="@(StrongNameSignInfo)" /> |
|||
<FileExtensionSignInfo Remove="@(FileExtensionSignInfo)" /> |
|||
</ItemGroup> |
|||
|
|||
</Project> |
|||
@ -0,0 +1,19 @@ |
|||
<?xml version="1.0" encoding="utf-8"?> |
|||
<Dependencies> |
|||
|
|||
<ProductDependencies> |
|||
</ProductDependencies> |
|||
|
|||
<ToolsetDependencies> |
|||
<Dependency Name="Microsoft.DotNet.Arcade.Sdk" Version="1.0.0-beta.19405.1"> |
|||
<Uri>https://github.com/dotnet/arcade</Uri> |
|||
<Sha>af34d3d032aaaa0ed6756de4e9dd50a94f7b40f2</Sha> |
|||
</Dependency> |
|||
|
|||
<Dependency Name="Microsoft.DotNet.Helix.Sdk" Version="2.0.0-beta.19405.1"> |
|||
<Uri>https://github.com/dotnet/arcade</Uri> |
|||
<Sha>af34d3d032aaaa0ed6756de4e9dd50a94f7b40f2</Sha> |
|||
</Dependency> |
|||
</ToolsetDependencies> |
|||
|
|||
</Dependencies> |
|||
@ -0,0 +1,29 @@ |
|||
<Project> |
|||
|
|||
<PropertyGroup> |
|||
<VersionPrefix>3.0.0</VersionPrefix> |
|||
<PreReleaseVersionLabel>alpha1</PreReleaseVersionLabel> |
|||
</PropertyGroup> |
|||
|
|||
<PropertyGroup> |
|||
<AspNetCoreVersion>3.0.0-preview8.19405.7</AspNetCoreVersion> |
|||
<BclAsyncInterfacesVersion>1.0.0-preview8.19405.3</BclAsyncInterfacesVersion> |
|||
<CoreFxVersion>4.4.0</CoreFxVersion> |
|||
<CryptoHelperVersion>3.0.2</CryptoHelperVersion> |
|||
<DataAnnotationsVersion>4.4.0</DataAnnotationsVersion> |
|||
<EntityFrameworkVersion>6.3.0-preview8-19405-04</EntityFrameworkVersion> |
|||
<EntityFrameworkCoreVersion>3.0.0-preview8.19405.11</EntityFrameworkCoreVersion> |
|||
<ExtensionsVersion>3.0.0-preview8.19405.4</ExtensionsVersion> |
|||
<JetBrainsVersion>2018.3.0</JetBrainsVersion> |
|||
<JsonNetVersion>12.0.2</JsonNetVersion> |
|||
<JsonNetBsonVersion>1.0.1</JsonNetBsonVersion> |
|||
<IdentityModelVersion>6.2.0-preview-60806030202</IdentityModelVersion> |
|||
<ImmutableCollectionsVersion>1.5.0</ImmutableCollectionsVersion> |
|||
<MongoDbVersion>2.7.0</MongoDbVersion> |
|||
<MoqVersion>4.7.63</MoqVersion> |
|||
<NHibernateVersion>5.2.2</NHibernateVersion> |
|||
<OwinVersion>4.0.0</OwinVersion> |
|||
<TasksExtensionsVersion>4.5.3</TasksExtensionsVersion> |
|||
</PropertyGroup> |
|||
|
|||
</Project> |
|||
@ -0,0 +1,2 @@ |
|||
@echo off |
|||
powershell -ExecutionPolicy ByPass -NoProfile -command "& """%~dp0Build.ps1""" -restore -build -test -sign -pack -publish -ci %*" |
|||
@ -0,0 +1,158 @@ |
|||
param( |
|||
[Parameter(Mandatory=$true)][string] $InputPath, # Full path to directory where NuGet packages to be checked are stored |
|||
[Parameter(Mandatory=$true)][string] $ExtractPath, # Full path to directory where the packages will be extracted during validation |
|||
[Parameter(Mandatory=$true)][string] $SymbolToolPath # Full path to directory where dotnet symbol-tool was installed |
|||
) |
|||
|
|||
Add-Type -AssemblyName System.IO.Compression.FileSystem |
|||
|
|||
function FirstMatchingSymbolDescriptionOrDefault { |
|||
param( |
|||
[string] $FullPath, # Full path to the module that has to be checked |
|||
[string] $TargetServerParam, # Parameter to pass to `Symbol Tool` indicating the server to lookup for symbols |
|||
[string] $SymbolsPath |
|||
) |
|||
|
|||
$FileName = [System.IO.Path]::GetFileName($FullPath) |
|||
$Extension = [System.IO.Path]::GetExtension($FullPath) |
|||
|
|||
# Those below are potential symbol files that the `dotnet symbol` might |
|||
# return. Which one will be returned depend on the type of file we are |
|||
# checking and which type of file was uploaded. |
|||
|
|||
# The file itself is returned |
|||
$SymbolPath = $SymbolsPath + "\" + $FileName |
|||
|
|||
# PDB file for the module |
|||
$PdbPath = $SymbolPath.Replace($Extension, ".pdb") |
|||
|
|||
# PDB file for R2R module (created by crossgen) |
|||
$NGenPdb = $SymbolPath.Replace($Extension, ".ni.pdb") |
|||
|
|||
# DBG file for a .so library |
|||
$SODbg = $SymbolPath.Replace($Extension, ".so.dbg") |
|||
|
|||
# DWARF file for a .dylib |
|||
$DylibDwarf = $SymbolPath.Replace($Extension, ".dylib.dwarf") |
|||
|
|||
.\dotnet-symbol.exe --symbols --modules --windows-pdbs $TargetServerParam $FullPath -o $SymbolsPath | Out-Null |
|||
|
|||
if (Test-Path $PdbPath) { |
|||
return "PDB" |
|||
} |
|||
elseif (Test-Path $NGenPdb) { |
|||
return "NGen PDB" |
|||
} |
|||
elseif (Test-Path $SODbg) { |
|||
return "DBG for SO" |
|||
} |
|||
elseif (Test-Path $DylibDwarf) { |
|||
return "Dwarf for Dylib" |
|||
} |
|||
elseif (Test-Path $SymbolPath) { |
|||
return "Module" |
|||
} |
|||
else { |
|||
return $null |
|||
} |
|||
} |
|||
|
|||
function CountMissingSymbols { |
|||
param( |
|||
[string] $PackagePath # Path to a NuGet package |
|||
) |
|||
|
|||
# Ensure input file exist |
|||
if (!(Test-Path $PackagePath)) { |
|||
throw "Input file does not exist: $PackagePath" |
|||
} |
|||
|
|||
# Extensions for which we'll look for symbols |
|||
$RelevantExtensions = @(".dll", ".exe", ".so", ".dylib") |
|||
|
|||
# How many files are missing symbol information |
|||
$MissingSymbols = 0 |
|||
|
|||
$PackageId = [System.IO.Path]::GetFileNameWithoutExtension($PackagePath) |
|||
$PackageGuid = New-Guid |
|||
$ExtractPath = Join-Path -Path $ExtractPath -ChildPath $PackageGuid |
|||
$SymbolsPath = Join-Path -Path $ExtractPath -ChildPath "Symbols" |
|||
|
|||
[System.IO.Compression.ZipFile]::ExtractToDirectory($PackagePath, $ExtractPath) |
|||
|
|||
# Makes easier to reference `symbol tool` |
|||
Push-Location $SymbolToolPath |
|||
|
|||
Get-ChildItem -Recurse $ExtractPath | |
|||
Where-Object {$RelevantExtensions -contains $_.Extension} | |
|||
ForEach-Object { |
|||
if ($_.FullName -Match "\\ref\\") { |
|||
Write-Host "`t Ignoring reference assembly file" $_.FullName |
|||
return |
|||
} |
|||
|
|||
$SymbolsOnMSDL = FirstMatchingSymbolDescriptionOrDefault $_.FullName "--microsoft-symbol-server" $SymbolsPath |
|||
$SymbolsOnSymWeb = FirstMatchingSymbolDescriptionOrDefault $_.FullName "--internal-server" $SymbolsPath |
|||
|
|||
Write-Host -NoNewLine "`t Checking file" $_.FullName "... " |
|||
|
|||
if ($SymbolsOnMSDL -ne $null -and $SymbolsOnSymWeb -ne $null) { |
|||
Write-Host "Symbols found on MSDL (" $SymbolsOnMSDL ") and SymWeb (" $SymbolsOnSymWeb ")" |
|||
} |
|||
else { |
|||
$MissingSymbols++ |
|||
|
|||
if ($SymbolsOnMSDL -eq $null -and $SymbolsOnSymWeb -eq $null) { |
|||
Write-Host "No symbols found on MSDL or SymWeb!" |
|||
} |
|||
else { |
|||
if ($SymbolsOnMSDL -eq $null) { |
|||
Write-Host "No symbols found on MSDL!" |
|||
} |
|||
else { |
|||
Write-Host "No symbols found on SymWeb!" |
|||
} |
|||
} |
|||
} |
|||
} |
|||
|
|||
Pop-Location |
|||
|
|||
return $MissingSymbols |
|||
} |
|||
|
|||
function CheckSymbolsAvailable { |
|||
if (Test-Path $ExtractPath) { |
|||
Remove-Item $ExtractPath -Force -Recurse -ErrorAction SilentlyContinue |
|||
} |
|||
|
|||
Get-ChildItem "$InputPath\*.nupkg" | |
|||
ForEach-Object { |
|||
$FileName = $_.Name |
|||
|
|||
# These packages from Arcade-Services include some native libraries that |
|||
# our current symbol uploader can't handle. Below is a workaround until |
|||
# we get issue: https://github.com/dotnet/arcade/issues/2457 sorted. |
|||
if ($FileName -Match "Microsoft\.DotNet\.Darc\.") { |
|||
Write-Host "Ignoring Arcade-services file: $FileName" |
|||
Write-Host |
|||
return |
|||
} |
|||
elseif ($FileName -Match "Microsoft\.DotNet\.Maestro\.Tasks\.") { |
|||
Write-Host "Ignoring Arcade-services file: $FileName" |
|||
Write-Host |
|||
return |
|||
} |
|||
|
|||
Write-Host "Validating $FileName " |
|||
$Status = CountMissingSymbols "$InputPath\$FileName" |
|||
|
|||
if ($Status -ne 0) { |
|||
Write-Error "Missing symbols for $Status modules in the package $FileName" |
|||
} |
|||
|
|||
Write-Host |
|||
} |
|||
} |
|||
|
|||
CheckSymbolsAvailable |
|||
@ -0,0 +1,11 @@ |
|||
@{ |
|||
IncludeRules=@('PSAvoidUsingCmdletAliases', |
|||
'PSAvoidUsingWMICmdlet', |
|||
'PSAvoidUsingPositionalParameters', |
|||
'PSAvoidUsingInvokeExpression', |
|||
'PSUseDeclaredVarsMoreThanAssignments', |
|||
'PSUseCmdletCorrectly', |
|||
'PSStandardDSCFunctionsInResource', |
|||
'PSUseIdenticalMandatoryParametersForDSC', |
|||
'PSUseIdenticalParametersForDSC') |
|||
} |
|||
@ -0,0 +1,83 @@ |
|||
<!-- Licensed to the .NET Foundation under one or more agreements. The .NET Foundation licenses this file to you under the MIT license. See the LICENSE file in the project root for more information. --> |
|||
<Project Sdk="Microsoft.NET.Sdk"> |
|||
<!-- |
|||
This MSBuild file is intended to be used as the body of the default |
|||
publishing release pipeline. The release pipeline will use this file |
|||
to invoke the PushToStaticFeed task that will read the build asset |
|||
manifest and publish the assets described in the manifest to |
|||
informed target feeds. |
|||
--> |
|||
|
|||
<PropertyGroup> |
|||
<TargetFramework>netcoreapp2.1</TargetFramework> |
|||
</PropertyGroup> |
|||
|
|||
<Import Project="$(MSBuildThisFileDirectory)DefaultVersions.props" Condition="Exists('$(MSBuildThisFileDirectory)DefaultVersions.props')" /> |
|||
|
|||
<!-- |
|||
This won't be necessary once we solve this issue: |
|||
https://github.com/dotnet/arcade/issues/2266 |
|||
--> |
|||
<Import Project="$(MSBuildThisFileDirectory)ArtifactsCategory.props" Condition="Exists('$(MSBuildThisFileDirectory)ArtifactsCategory.props')" /> |
|||
|
|||
<Import Project="$(NuGetPackageRoot)microsoft.dotnet.build.tasks.feed\$(MicrosoftDotNetBuildTasksFeedVersion)\build\Microsoft.DotNet.Build.Tasks.Feed.targets" /> |
|||
|
|||
<Target Name="PublishToFeed"> |
|||
<Error Condition="'$(ArtifactsCategory)' == ''" Text="ArtifactsCategory: The artifacts' category produced by the build wasn't provided." /> |
|||
<Error Condition="'$(AccountKeyToStaticFeed)' == ''" Text="AccountKeyToStaticFeed: Account key for target feed wasn't provided." /> |
|||
<Error Condition="'$(ManifestsBasePath)' == ''" Text="Full path to asset manifests directory wasn't provided." /> |
|||
<Error Condition="'$(BlobBasePath)' == '' AND '$(PackageBasePath)' == ''" Text="A valid full path to BlobBasePath of PackageBasePath is required." /> |
|||
|
|||
<ItemGroup> |
|||
<!-- Include all manifests found in the manifest folder. --> |
|||
<ManifestFiles Include="$(ManifestsBasePath)*.xml" /> |
|||
</ItemGroup> |
|||
|
|||
<Error Condition="'@(ManifestFiles)' == ''" Text="No manifest file was found in the provided path: $(ManifestsBasePath)" /> |
|||
|
|||
<!-- |
|||
For now the type of packages being published will be informed for the whole build. |
|||
Eventually this will be specified on a per package basis: |
|||
TODO: https://github.com/dotnet/arcade/issues/2266 |
|||
--> |
|||
<PropertyGroup> |
|||
<TargetStaticFeed Condition="'$(ArtifactsCategory.ToUpper())' == '.NETCORE'">https://dotnetfeed.blob.core.windows.net/dotnet-core/index.json</TargetStaticFeed> |
|||
<TargetStaticFeed Condition="'$(ArtifactsCategory.ToUpper())' == '.NETCOREVALIDATION'">https://dotnetfeed.blob.core.windows.net/arcade-validation/index.json</TargetStaticFeed> |
|||
<TargetStaticFeed Condition="'$(ArtifactsCategory.ToUpper())' == 'ASPNETCORE'">https://dotnetfeed.blob.core.windows.net/aspnet-aspnetcore/index.json</TargetStaticFeed> |
|||
<TargetStaticFeed Condition="'$(ArtifactsCategory.ToUpper())' == 'ASPNETCORETOOLING'">https://dotnetfeed.blob.core.windows.net/aspnet-aspnetcore-tooling/index.json</TargetStaticFeed> |
|||
<TargetStaticFeed Condition="'$(ArtifactsCategory.ToUpper())' == 'ENTITYFRAMEWORKCORE'">https://dotnetfeed.blob.core.windows.net/aspnet-entityframeworkcore/index.json</TargetStaticFeed> |
|||
<TargetStaticFeed Condition="'$(ArtifactsCategory.ToUpper())' == 'ASPNETEXTENSIONS'">https://dotnetfeed.blob.core.windows.net/aspnet-extensions/index.json</TargetStaticFeed> |
|||
<TargetStaticFeed Condition="'$(ArtifactsCategory.ToUpper())' == 'CORECLR'">https://dotnetfeed.blob.core.windows.net/dotnet-coreclr/index.json</TargetStaticFeed> |
|||
<TargetStaticFeed Condition="'$(ArtifactsCategory.ToUpper())' == 'CORESDK'">https://dotnetfeed.blob.core.windows.net/dotnet-sdk/index.json</TargetStaticFeed> |
|||
<TargetStaticFeed Condition="'$(ArtifactsCategory.ToUpper())' == 'TOOLSINTERNAL'">https://dotnetfeed.blob.core.windows.net/dotnet-tools-internal/index.json</TargetStaticFeed> |
|||
<TargetStaticFeed Condition="'$(ArtifactsCategory.ToUpper())' == 'TOOLSET'">https://dotnetfeed.blob.core.windows.net/dotnet-toolset/index.json</TargetStaticFeed> |
|||
<TargetStaticFeed Condition="'$(ArtifactsCategory.ToUpper())' == 'WINDOWSDESKTOP'">https://dotnetfeed.blob.core.windows.net/dotnet-windowsdesktop/index.json</TargetStaticFeed> |
|||
<TargetStaticFeed Condition="'$(ArtifactsCategory.ToUpper())' == 'NUGETCLIENT'">https://dotnetfeed.blob.core.windows.net/nuget-nugetclient/index.json</TargetStaticFeed> |
|||
<TargetStaticFeed Condition="'$(ArtifactsCategory.ToUpper())' == 'ASPNETENTITYFRAMEWORK6'">https://dotnetfeed.blob.core.windows.net/aspnet-entityframework6/index.json</TargetStaticFeed> |
|||
<TargetStaticFeed Condition="'$(ArtifactsCategory.ToUpper())' == 'ASPNETBLAZOR'">https://dotnetfeed.blob.core.windows.net/aspnet-blazor/index.json</TargetStaticFeed> |
|||
</PropertyGroup> |
|||
|
|||
<Error |
|||
Condition="'$(TargetStaticFeed)' == ''" |
|||
Text="'$(ArtifactsCategory)' wasn't recognized as a valid artifact category. Valid categories are: '.NetCore' and '.NetCoreValidation'" /> |
|||
|
|||
<!-- Iterate publishing assets from each manifest file. --> |
|||
<PushArtifactsInManifestToFeed |
|||
ExpectedFeedUrl="$(TargetStaticFeed)" |
|||
AccountKey="$(AccountKeyToStaticFeed)" |
|||
BARBuildId="$(BARBuildId)" |
|||
MaestroApiEndpoint="$(MaestroApiEndpoint)" |
|||
BuildAssetRegistryToken="$(BuildAssetRegistryToken)" |
|||
Overwrite="$(OverrideAssetsWithSameName)" |
|||
PassIfExistingItemIdentical="$(PassIfExistingItemIdentical)" |
|||
MaxClients="$(MaxParallelUploads)" |
|||
UploadTimeoutInMinutes="$(MaxUploadTimeoutInMinutes)" |
|||
AssetManifestPath="%(ManifestFiles.Identity)" |
|||
BlobAssetsBasePath="$(BlobBasePath)" |
|||
PackageAssetsBasePath="$(PackageBasePath)"/> |
|||
</Target> |
|||
|
|||
<ItemGroup> |
|||
<PackageReference Include="Microsoft.DotNet.Build.Tasks.Feed" Version="$(MicrosoftDotNetBuildTasksFeedVersion)" /> |
|||
</ItemGroup> |
|||
</Project> |
|||
@ -0,0 +1,82 @@ |
|||
<!-- Licensed to the .NET Foundation under one or more agreements. The .NET Foundation licenses this file to you under the MIT license. See the LICENSE file in the project root for more information. --> |
|||
<Project Sdk="Microsoft.NET.Sdk"> |
|||
<!-- |
|||
This MSBuild file is intended to be used as the body of the default |
|||
publishing release pipeline. The release pipeline will use this file |
|||
to invoke the PublishSymbols tasks to publish symbols to MSDL and SymWeb. |
|||
|
|||
Parameters: |
|||
|
|||
- PDBArtifactsDirectory : Full path to directory containing PDB files to be published. |
|||
- BlobBasePath : Full path containing *.symbols.nupkg packages to be published. |
|||
- DotNetSymbolServerTokenMsdl : PAT to access MSDL. |
|||
- DotNetSymbolServerTokenSymWeb : PAT to access SymWeb. |
|||
- DotNetSymbolExpirationInDays : Expiration days for published packages. Default is 3650. |
|||
--> |
|||
|
|||
<PropertyGroup> |
|||
<TargetFramework>netcoreapp2.1</TargetFramework> |
|||
</PropertyGroup> |
|||
|
|||
<Import Project="$(NuGetPackageRoot)microsoft.symboluploader.build.task\$(SymbolUploaderVersion)\build\PublishSymbols.targets" /> |
|||
|
|||
<Target Name="PublishSymbols"> |
|||
<ItemGroup> |
|||
<FilesToPublishToSymbolServer Include="$(PDBArtifactsDirectory)\*.pdb"/> |
|||
<PackagesToPublishToSymbolServer Include="$(BlobBasePath)\*.symbols.nupkg"/> |
|||
|
|||
<!-- |
|||
These packages from Arcade-Services include some native libraries that |
|||
our current symbol uploader can't handle. Below is a workaround until |
|||
we get issue: https://github.com/dotnet/arcade/issues/2457 sorted. |
|||
--> |
|||
<PackagesToPublishToSymbolServer Remove="$(BlobBasePath)\Microsoft.DotNet.Darc.*" /> |
|||
<PackagesToPublishToSymbolServer Remove="$(BlobBasePath)\Microsoft.DotNet.Maestro.Tasks.*" /> |
|||
</ItemGroup> |
|||
|
|||
<PropertyGroup> |
|||
<DotNetSymbolExpirationInDays Condition="'$(DotNetSymbolExpirationInDays)' == ''">3650</DotNetSymbolExpirationInDays> |
|||
<PublishToSymbolServer>true</PublishToSymbolServer> |
|||
<PublishToSymbolServer Condition="'@(FilesToPublishToSymbolServer)' == '' and '@(PackagesToPublishToSymbolServer)' == ''">false</PublishToSymbolServer> |
|||
</PropertyGroup> |
|||
|
|||
<Message |
|||
Importance="High" |
|||
Text="No symbol package(s) were found to publish." |
|||
Condition="$(PublishToSymbolServer) == false" /> |
|||
|
|||
<!-- Symbol Uploader: MSDL --> |
|||
<Message Importance="High" Text="Publishing symbol packages to MSDL ..." Condition="$(PublishToSymbolServer)" /> |
|||
<PublishSymbols PackagesToPublish="@(PackagesToPublishToSymbolServer)" |
|||
FilesToPublish="@(FilesToPublishToSymbolServer)" |
|||
PersonalAccessToken="$(DotNetSymbolServerTokenMsdl)" |
|||
SymbolServerPath="https://microsoftpublicsymbols.artifacts.visualstudio.com/DefaultCollection" |
|||
ExpirationInDays="$(DotNetSymbolExpirationInDays)" |
|||
VerboseLogging="true" |
|||
DryRun="false" |
|||
ConvertPortablePdbsToWindowsPdbs="false" |
|||
PdbConversionTreatAsWarning="" |
|||
Condition="$(PublishToSymbolServer)"/> |
|||
|
|||
<!-- |
|||
Symbol Uploader: SymWeb |
|||
Watson, VS insertion testings and the typical internal dev usage require SymWeb. |
|||
Currently we need to call the task twice (https://github.com/dotnet/core-eng/issues/3489). |
|||
--> |
|||
<Message Importance="High" Text="Publishing symbol packages to SymWeb ..." Condition="$(PublishToSymbolServer)" /> |
|||
<PublishSymbols PackagesToPublish="@(PackagesToPublishToSymbolServer)" |
|||
FilesToPublish="@(FilesToPublishToSymbolServer)" |
|||
PersonalAccessToken="$(DotNetSymbolServerTokenSymWeb)" |
|||
SymbolServerPath="https://microsoft.artifacts.visualstudio.com/DefaultCollection" |
|||
ExpirationInDays="$(DotNetSymbolExpirationInDays)" |
|||
VerboseLogging="true" |
|||
DryRun="false" |
|||
ConvertPortablePdbsToWindowsPdbs="false" |
|||
PdbConversionTreatAsWarning="" |
|||
Condition="$(PublishToSymbolServer)"/> |
|||
</Target> |
|||
|
|||
<ItemGroup> |
|||
<PackageReference Include="Microsoft.SymbolUploader.Build.Task" Version="$(SymbolUploaderVersion)" /> |
|||
</ItemGroup> |
|||
</Project> |
|||
@ -0,0 +1,28 @@ |
|||
# Don't touch this folder |
|||
|
|||
uuuuuuuuuuuuuuuuuuuu |
|||
u" uuuuuuuuuuuuuuuuuu "u |
|||
u" u$$$$$$$$$$$$$$$$$$$$u "u |
|||
u" u$$$$$$$$$$$$$$$$$$$$$$$$u "u |
|||
u" u$$$$$$$$$$$$$$$$$$$$$$$$$$$$u "u |
|||
u" u$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$u "u |
|||
u" u$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$u "u |
|||
$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $ |
|||
$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $ |
|||
$ $$$" ... "$... ...$" ... "$$$ ... "$$$ $ |
|||
$ $$$u `"$$$$$$$ $$$ $$$$$ $$ $$$ $$$ $ |
|||
$ $$$$$$uu "$$$$ $$$ $$$$$ $$ """ u$$$ $ |
|||
$ $$$""$$$ $$$$ $$$u "$$$" u$$ $$$$$$$$ $ |
|||
$ $$$$....,$$$$$..$$$$$....,$$$$..$$$$$$$$ $ |
|||
$ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $ |
|||
"u "$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$" u" |
|||
"u "$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$" u" |
|||
"u "$$$$$$$$$$$$$$$$$$$$$$$$$$$$" u" |
|||
"u "$$$$$$$$$$$$$$$$$$$$$$$$" u" |
|||
"u "$$$$$$$$$$$$$$$$$$$$" u" |
|||
"u """""""""""""""""" u" |
|||
"""""""""""""""""""" |
|||
|
|||
!!! Changes made in this directory are subject to being overwritten by automation !!! |
|||
|
|||
The files in this directory are shared by all Arcade repos and managed by automation. If you need to make changes to these files, open an issue or submit a pull request to https://github.com/dotnet/arcade first. |
|||
@ -0,0 +1,83 @@ |
|||
<!-- Licensed to the .NET Foundation under one or more agreements. The .NET Foundation licenses this file to you under the MIT license. See the LICENSE file in the project root for more information. --> |
|||
<Project Sdk="Microsoft.NET.Sdk"> |
|||
<!-- |
|||
This MSBuild file is intended to be used as the body of the default |
|||
publishing release pipeline. The release pipeline will use this file |
|||
to invoke the SignCheck tool to validate that packages about to |
|||
be published are correctly signed. |
|||
|
|||
Parameters: |
|||
|
|||
- PackageBasePath : Directory containing all files that need to be validated. |
|||
- SignCheckVersion : Version of SignCheck package to be used. |
|||
- SignValidationExclusionList : ItemGroup containing exclusion list to be forwarded to SignCheck. |
|||
- EnableJarSigningCheck : Whether .jar files should be validated. |
|||
- EnableStrongNameCheck : Whether strong name check should be performed. |
|||
--> |
|||
|
|||
<PropertyGroup> |
|||
<TargetFramework>netcoreapp2.1</TargetFramework> |
|||
</PropertyGroup> |
|||
|
|||
<!-- |
|||
From 'Signing.props' we import $(SignValidationExclusionList) |
|||
--> |
|||
<Import Project="$(MSBuildThisFileDirectory)Signing.props" Condition="Exists('$(MSBuildThisFileDirectory)Signing.props')" /> |
|||
|
|||
<Target Name="ValidateSigning"> |
|||
<PropertyGroup> |
|||
<SignCheckToolPath>$(NuGetPackageRoot)Microsoft.DotNet.SignCheck\$(SignCheckVersion)\tools\Microsoft.DotNet.SignCheck.exe</SignCheckToolPath> |
|||
|
|||
<SignCheckInputDir>$(PackageBasePath)</SignCheckInputDir> |
|||
<SignCheckLog>signcheck.log</SignCheckLog> |
|||
<SignCheckErrorLog>signcheck.errors.log</SignCheckErrorLog> |
|||
<SignCheckExclusionsFile>signcheck.exclusions.txt</SignCheckExclusionsFile> |
|||
</PropertyGroup> |
|||
|
|||
<ItemGroup> |
|||
<!-- |
|||
Documentation for these arguments is available here: |
|||
https://github.com/dotnet/arcade/tree/master/src/SignCheck |
|||
--> |
|||
<SignCheckArgs Include="--recursive" /> |
|||
<SignCheckArgs Include="--traverse-subfolders" /> |
|||
<SignCheckArgs Include="--file-status AllFiles" /> |
|||
<SignCheckArgs Include="--log-file $(SignCheckLog)" /> |
|||
<SignCheckArgs Include="--error-log-file $(SignCheckErrorLog)" /> |
|||
<SignCheckArgs Include="--input-files $(SignCheckInputDir)" /> |
|||
|
|||
<SignCheckArgs Include="--exclusions-file $(SignCheckExclusionsFile)" Condition="'@(SignValidationExclusionList)' != ''" /> |
|||
<SignCheckArgs Include="--verify-jar" Condition="'$(EnableJarSigningCheck)' == 'true'" /> |
|||
<SignCheckArgs Include="--verify-strongname" Condition="'$(EnableStrongNameCheck)' == 'true'" /> |
|||
</ItemGroup> |
|||
|
|||
<WriteLinesToFile |
|||
File="$(SignCheckExclusionsFile)" |
|||
Lines="@(SignValidationExclusionList)" |
|||
Condition="'@(SignValidationExclusionList)' != ''" |
|||
Overwrite="true" |
|||
Encoding="Unicode"/> |
|||
|
|||
<!-- |
|||
IgnoreExitCode='true' because the tool doesn't return '0' on success. |
|||
--> |
|||
<Exec |
|||
Command=""$(SignCheckToolPath)" @(SignCheckArgs, ' ')" |
|||
IgnoreExitCode='true' |
|||
ConsoleToMsBuild="false" |
|||
StandardErrorImportance="high" /> |
|||
|
|||
<Error |
|||
Text="Signing validation failed. Check $(SignCheckErrorLog) for more information." |
|||
Condition="Exists($(SignCheckErrorLog)) and '$([System.IO.File]::ReadAllText($(SignCheckErrorLog)))' != ''" /> |
|||
|
|||
<Message |
|||
Text="##vso[artifact.upload containerfolder=LogFiles;artifactname=LogFiles]{SignCheckErrorLog}" |
|||
Condition="Exists($(SignCheckErrorLog)) and '$([System.IO.File]::ReadAllText($(SignCheckErrorLog)))' != ''" /> |
|||
|
|||
</Target> |
|||
|
|||
<ItemGroup> |
|||
<PackageReference Include="Microsoft.DotNet.SignCheck" Version="$(SignCheckVersion)" /> |
|||
</ItemGroup> |
|||
</Project> |
|||
@ -0,0 +1,184 @@ |
|||
param( |
|||
[Parameter(Mandatory=$true)][string] $InputPath, # Full path to directory where Symbols.NuGet packages to be checked are stored |
|||
[Parameter(Mandatory=$true)][string] $ExtractPath, # Full path to directory where the packages will be extracted during validation |
|||
[Parameter(Mandatory=$true)][string] $SourceLinkToolPath, # Full path to directory where dotnet SourceLink CLI was installed |
|||
[Parameter(Mandatory=$true)][string] $GHRepoName, # GitHub name of the repo including the Org. E.g., dotnet/arcade |
|||
[Parameter(Mandatory=$true)][string] $GHCommit # GitHub commit SHA used to build the packages |
|||
) |
|||
|
|||
# Cache/HashMap (File -> Exist flag) used to consult whether a file exist |
|||
# in the repository at a specific commit point. This is populated by inserting |
|||
# all files present in the repo at a specific commit point. |
|||
$global:RepoFiles = @{} |
|||
|
|||
$ValidatePackage = { |
|||
param( |
|||
[string] $PackagePath # Full path to a Symbols.NuGet package |
|||
) |
|||
|
|||
# Ensure input file exist |
|||
if (!(Test-Path $PackagePath)) { |
|||
throw "Input file does not exist: $PackagePath" |
|||
} |
|||
|
|||
# Extensions for which we'll look for SourceLink information |
|||
# For now we'll only care about Portable & Embedded PDBs |
|||
$RelevantExtensions = @(".dll", ".exe", ".pdb") |
|||
|
|||
Write-Host -NoNewLine "Validating" ([System.IO.Path]::GetFileName($PackagePath)) "... " |
|||
|
|||
$PackageId = [System.IO.Path]::GetFileNameWithoutExtension($PackagePath) |
|||
$ExtractPath = Join-Path -Path $using:ExtractPath -ChildPath $PackageId |
|||
$FailedFiles = 0 |
|||
|
|||
Add-Type -AssemblyName System.IO.Compression.FileSystem |
|||
|
|||
[System.IO.Directory]::CreateDirectory($ExtractPath); |
|||
|
|||
$zip = [System.IO.Compression.ZipFile]::OpenRead($PackagePath) |
|||
|
|||
$zip.Entries | |
|||
Where-Object {$RelevantExtensions -contains [System.IO.Path]::GetExtension($_.Name)} | |
|||
ForEach-Object { |
|||
$FileName = $_.FullName |
|||
$Extension = [System.IO.Path]::GetExtension($_.Name) |
|||
$FakeName = -Join((New-Guid), $Extension) |
|||
$TargetFile = Join-Path -Path $ExtractPath -ChildPath $FakeName |
|||
|
|||
# We ignore resource DLLs |
|||
if ($FileName.EndsWith(".resources.dll")) { |
|||
return |
|||
} |
|||
|
|||
[System.IO.Compression.ZipFileExtensions]::ExtractToFile($_, $TargetFile, $true) |
|||
|
|||
$ValidateFile = { |
|||
param( |
|||
[string] $FullPath, # Full path to the module that has to be checked |
|||
[string] $RealPath, |
|||
[ref] $FailedFiles |
|||
) |
|||
|
|||
# Makes easier to reference `sourcelink cli` |
|||
Push-Location $using:SourceLinkToolPath |
|||
|
|||
$SourceLinkInfos = .\sourcelink.exe print-urls $FullPath | Out-String |
|||
|
|||
if ($LASTEXITCODE -eq 0 -and -not ([string]::IsNullOrEmpty($SourceLinkInfos))) { |
|||
$NumFailedLinks = 0 |
|||
|
|||
# We only care about Http addresses |
|||
$Matches = (Select-String '(http[s]?)(:\/\/)([^\s,]+)' -Input $SourceLinkInfos -AllMatches).Matches |
|||
|
|||
if ($Matches.Count -ne 0) { |
|||
$Matches.Value | |
|||
ForEach-Object { |
|||
$Link = $_ |
|||
$CommitUrl = -Join("https://raw.githubusercontent.com/", $using:GHRepoName, "/", $using:GHCommit, "/") |
|||
$FilePath = $Link.Replace($CommitUrl, "") |
|||
$Status = 200 |
|||
$Cache = $using:RepoFiles |
|||
|
|||
if ( !($Cache.ContainsKey($FilePath)) ) { |
|||
try { |
|||
$Uri = $Link -as [System.URI] |
|||
|
|||
# Only GitHub links are valid |
|||
if ($Uri.AbsoluteURI -ne $null -and $Uri.Host -match "github") { |
|||
$Status = (Invoke-WebRequest -Uri $Link -UseBasicParsing -Method HEAD -TimeoutSec 5).StatusCode |
|||
} |
|||
else { |
|||
$Status = 0 |
|||
} |
|||
} |
|||
catch { |
|||
$Status = 0 |
|||
} |
|||
} |
|||
|
|||
if ($Status -ne 200) { |
|||
if ($NumFailedLinks -eq 0) { |
|||
if ($FailedFiles.Value -eq 0) { |
|||
Write-Host |
|||
} |
|||
|
|||
Write-Host "`tFile $RealPath has broken links:" |
|||
} |
|||
|
|||
Write-Host "`t`tFailed to retrieve $Link" |
|||
|
|||
$NumFailedLinks++ |
|||
} |
|||
} |
|||
} |
|||
|
|||
if ($NumFailedLinks -ne 0) { |
|||
$FailedFiles.value++ |
|||
$global:LASTEXITCODE = 1 |
|||
} |
|||
} |
|||
|
|||
Pop-Location |
|||
} |
|||
|
|||
&$ValidateFile $TargetFile $FileName ([ref]$FailedFiles) |
|||
} |
|||
|
|||
$zip.Dispose() |
|||
|
|||
if ($FailedFiles -eq 0) { |
|||
Write-Host "Passed." |
|||
} |
|||
} |
|||
|
|||
function ValidateSourceLinkLinks { |
|||
if (!($GHRepoName -Match "^[^\s\/]+/[^\s\/]+$")) { |
|||
Write-Host "GHRepoName should be in the format <org>/<repo>" |
|||
$global:LASTEXITCODE = 1 |
|||
return |
|||
} |
|||
|
|||
if (!($GHCommit -Match "^[0-9a-fA-F]{40}$")) { |
|||
Write-Host "GHCommit should be a 40 chars hexadecimal string" |
|||
$global:LASTEXITCODE = 1 |
|||
return |
|||
} |
|||
|
|||
$RepoTreeURL = -Join("https://api.github.com/repos/", $GHRepoName, "/git/trees/", $GHCommit, "?recursive=1") |
|||
$CodeExtensions = @(".cs", ".vb", ".fs", ".fsi", ".fsx", ".fsscript") |
|||
|
|||
try { |
|||
# Retrieve the list of files in the repo at that particular commit point and store them in the RepoFiles hash |
|||
$Data = Invoke-WebRequest $RepoTreeURL | ConvertFrom-Json | Select-Object -ExpandProperty tree |
|||
|
|||
foreach ($file in $Data) { |
|||
$Extension = [System.IO.Path]::GetExtension($file.path) |
|||
|
|||
if ($CodeExtensions.Contains($Extension)) { |
|||
$RepoFiles[$file.path] = 1 |
|||
} |
|||
} |
|||
} |
|||
catch { |
|||
Write-Host "Problems downloading the list of files from the repo. Url used: $RepoTreeURL" |
|||
$global:LASTEXITCODE = 1 |
|||
return |
|||
} |
|||
|
|||
if (Test-Path $ExtractPath) { |
|||
Remove-Item $ExtractPath -Force -Recurse -ErrorAction SilentlyContinue |
|||
} |
|||
|
|||
# Process each NuGet package in parallel |
|||
$Jobs = @() |
|||
Get-ChildItem "$InputPath\*.symbols.nupkg" | |
|||
ForEach-Object { |
|||
$Jobs += Start-Job -ScriptBlock $ValidatePackage -ArgumentList $_.FullName |
|||
} |
|||
|
|||
foreach ($Job in $Jobs) { |
|||
Wait-Job -Id $Job.Id | Receive-Job |
|||
} |
|||
} |
|||
|
|||
Measure-Command { ValidateSourceLinkLinks } |
|||
@ -0,0 +1,141 @@ |
|||
[CmdletBinding(PositionalBinding=$false)] |
|||
Param( |
|||
[string][Alias('c')]$configuration = "Debug", |
|||
[string]$platform = $null, |
|||
[string] $projects, |
|||
[string][Alias('v')]$verbosity = "minimal", |
|||
[string] $msbuildEngine = $null, |
|||
[bool] $warnAsError = $true, |
|||
[bool] $nodeReuse = $true, |
|||
[switch][Alias('r')]$restore, |
|||
[switch] $deployDeps, |
|||
[switch][Alias('b')]$build, |
|||
[switch] $rebuild, |
|||
[switch] $deploy, |
|||
[switch][Alias('t')]$test, |
|||
[switch] $integrationTest, |
|||
[switch] $performanceTest, |
|||
[switch] $sign, |
|||
[switch] $pack, |
|||
[switch] $publish, |
|||
[switch][Alias('bl')]$binaryLog, |
|||
[switch] $ci, |
|||
[switch] $prepareMachine, |
|||
[switch] $help, |
|||
[Parameter(ValueFromRemainingArguments=$true)][String[]]$properties |
|||
) |
|||
|
|||
. $PSScriptRoot\tools.ps1 |
|||
|
|||
function Print-Usage() { |
|||
Write-Host "Common settings:" |
|||
Write-Host " -configuration <value> Build configuration: 'Debug' or 'Release' (short: -c)" |
|||
Write-Host " -platform <value> Platform configuration: 'x86', 'x64' or any valid Platform value to pass to msbuild" |
|||
Write-Host " -verbosity <value> Msbuild verbosity: q[uiet], m[inimal], n[ormal], d[etailed], and diag[nostic] (short: -v)" |
|||
Write-Host " -binaryLog Output binary log (short: -bl)" |
|||
Write-Host " -help Print help and exit" |
|||
Write-Host "" |
|||
|
|||
Write-Host "Actions:" |
|||
Write-Host " -restore Restore dependencies (short: -r)" |
|||
Write-Host " -build Build solution (short: -b)" |
|||
Write-Host " -rebuild Rebuild solution" |
|||
Write-Host " -deploy Deploy built VSIXes" |
|||
Write-Host " -deployDeps Deploy dependencies (e.g. VSIXes for integration tests)" |
|||
Write-Host " -test Run all unit tests in the solution (short: -t)" |
|||
Write-Host " -integrationTest Run all integration tests in the solution" |
|||
Write-Host " -performanceTest Run all performance tests in the solution" |
|||
Write-Host " -pack Package build outputs into NuGet packages and Willow components" |
|||
Write-Host " -sign Sign build outputs" |
|||
Write-Host " -publish Publish artifacts (e.g. symbols)" |
|||
Write-Host "" |
|||
|
|||
Write-Host "Advanced settings:" |
|||
Write-Host " -projects <value> Semi-colon delimited list of sln/proj's to build. Globbing is supported (*.sln)" |
|||
Write-Host " -ci Set when running on CI server" |
|||
Write-Host " -prepareMachine Prepare machine for CI run, clean up processes after build" |
|||
Write-Host " -warnAsError <value> Sets warnaserror msbuild parameter ('true' or 'false')" |
|||
Write-Host " -msbuildEngine <value> Msbuild engine to use to run build ('dotnet', 'vs', or unspecified)." |
|||
Write-Host "" |
|||
|
|||
Write-Host "Command line arguments not listed above are passed thru to msbuild." |
|||
Write-Host "The above arguments can be shortened as much as to be unambiguous (e.g. -co for configuration, -t for test, etc.)." |
|||
} |
|||
|
|||
function InitializeCustomToolset { |
|||
if (-not $restore) { |
|||
return |
|||
} |
|||
|
|||
$script = Join-Path $EngRoot "restore-toolset.ps1" |
|||
|
|||
if (Test-Path $script) { |
|||
. $script |
|||
} |
|||
} |
|||
|
|||
function Build { |
|||
$toolsetBuildProj = InitializeToolset |
|||
InitializeCustomToolset |
|||
|
|||
$bl = if ($binaryLog) { "/bl:" + (Join-Path $LogDir "Build.binlog") } else { "" } |
|||
$platformArg = if ($platform) { "/p:Platform=$platform" } else { "" } |
|||
|
|||
if ($projects) { |
|||
# Re-assign properties to a new variable because PowerShell doesn't let us append properties directly for unclear reasons. |
|||
# Explicitly set the type as string[] because otherwise PowerShell would make this char[] if $properties is empty. |
|||
[string[]] $msbuildArgs = $properties |
|||
$msbuildArgs += "/p:Projects=$projects" |
|||
$properties = $msbuildArgs |
|||
} |
|||
|
|||
MSBuild $toolsetBuildProj ` |
|||
$bl ` |
|||
$platformArg ` |
|||
/p:Configuration=$configuration ` |
|||
/p:RepoRoot=$RepoRoot ` |
|||
/p:Restore=$restore ` |
|||
/p:DeployDeps=$deployDeps ` |
|||
/p:Build=$build ` |
|||
/p:Rebuild=$rebuild ` |
|||
/p:Deploy=$deploy ` |
|||
/p:Test=$test ` |
|||
/p:Pack=$pack ` |
|||
/p:IntegrationTest=$integrationTest ` |
|||
/p:PerformanceTest=$performanceTest ` |
|||
/p:Sign=$sign ` |
|||
/p:Publish=$publish ` |
|||
@properties |
|||
} |
|||
|
|||
try { |
|||
if ($help -or (($null -ne $properties) -and ($properties.Contains("/help") -or $properties.Contains("/?")))) { |
|||
Print-Usage |
|||
exit 0 |
|||
} |
|||
|
|||
if ($ci) { |
|||
$binaryLog = $true |
|||
$nodeReuse = $false |
|||
} |
|||
|
|||
# Import custom tools configuration, if present in the repo. |
|||
# Note: Import in global scope so that the script set top-level variables without qualification. |
|||
$configureToolsetScript = Join-Path $EngRoot "configure-toolset.ps1" |
|||
if (Test-Path $configureToolsetScript) { |
|||
. $configureToolsetScript |
|||
} |
|||
|
|||
if (($restore) -and ($null -eq $env:DisableNativeToolsetInstalls)) { |
|||
InitializeNativeTools |
|||
} |
|||
|
|||
Build |
|||
} |
|||
catch { |
|||
Write-Host $_.ScriptStackTrace |
|||
Write-PipelineTelemetryError -Category "InitializeToolset" -Message $_ |
|||
ExitWithExitCode 1 |
|||
} |
|||
|
|||
ExitWithExitCode 0 |
|||
@ -0,0 +1,216 @@ |
|||
#!/usr/bin/env bash |
|||
|
|||
# Stop script if unbound variable found (use ${var:-} if intentional) |
|||
set -u |
|||
|
|||
# Stop script if command returns non-zero exit code. |
|||
# Prevents hidden errors caused by missing error code propagation. |
|||
set -e |
|||
|
|||
usage() |
|||
{ |
|||
echo "Common settings:" |
|||
echo " --configuration <value> Build configuration: 'Debug' or 'Release' (short: -c)" |
|||
echo " --verbosity <value> Msbuild verbosity: q[uiet], m[inimal], n[ormal], d[etailed], and diag[nostic] (short: -v)" |
|||
echo " --binaryLog Create MSBuild binary log (short: -bl)" |
|||
echo " --help Print help and exit (short: -h)" |
|||
echo "" |
|||
|
|||
echo "Actions:" |
|||
echo " --restore Restore dependencies (short: -r)" |
|||
echo " --build Build solution (short: -b)" |
|||
echo " --rebuild Rebuild solution" |
|||
echo " --test Run all unit tests in the solution (short: -t)" |
|||
echo " --integrationTest Run all integration tests in the solution" |
|||
echo " --performanceTest Run all performance tests in the solution" |
|||
echo " --pack Package build outputs into NuGet packages and Willow components" |
|||
echo " --sign Sign build outputs" |
|||
echo " --publish Publish artifacts (e.g. symbols)" |
|||
echo "" |
|||
|
|||
echo "Advanced settings:" |
|||
echo " --projects <value> Project or solution file(s) to build" |
|||
echo " --ci Set when running on CI server" |
|||
echo " --prepareMachine Prepare machine for CI run, clean up processes after build" |
|||
echo " --nodeReuse <value> Sets nodereuse msbuild parameter ('true' or 'false')" |
|||
echo " --warnAsError <value> Sets warnaserror msbuild parameter ('true' or 'false')" |
|||
echo "" |
|||
echo "Command line arguments not listed above are passed thru to msbuild." |
|||
echo "Arguments can also be passed in with a single hyphen." |
|||
} |
|||
|
|||
source="${BASH_SOURCE[0]}" |
|||
|
|||
# resolve $source until the file is no longer a symlink |
|||
while [[ -h "$source" ]]; do |
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
source="$(readlink "$source")" |
|||
# if $source was a relative symlink, we need to resolve it relative to the path where the |
|||
# symlink file was located |
|||
[[ $source != /* ]] && source="$scriptroot/$source" |
|||
done |
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
|
|||
restore=false |
|||
build=false |
|||
rebuild=false |
|||
test=false |
|||
integration_test=false |
|||
performance_test=false |
|||
pack=false |
|||
publish=false |
|||
sign=false |
|||
public=false |
|||
ci=false |
|||
|
|||
warn_as_error=true |
|||
node_reuse=true |
|||
binary_log=false |
|||
pipelines_log=false |
|||
|
|||
projects='' |
|||
configuration='Debug' |
|||
prepare_machine=false |
|||
verbosity='minimal' |
|||
|
|||
properties='' |
|||
|
|||
while [[ $# > 0 ]]; do |
|||
opt="$(echo "${1/#--/-}" | awk '{print tolower($0)}')" |
|||
case "$opt" in |
|||
-help|-h) |
|||
usage |
|||
exit 0 |
|||
;; |
|||
-configuration|-c) |
|||
configuration=$2 |
|||
shift |
|||
;; |
|||
-verbosity|-v) |
|||
verbosity=$2 |
|||
shift |
|||
;; |
|||
-binarylog|-bl) |
|||
binary_log=true |
|||
;; |
|||
-pipelineslog|-pl) |
|||
pipelines_log=true |
|||
;; |
|||
-restore|-r) |
|||
restore=true |
|||
;; |
|||
-build|-b) |
|||
build=true |
|||
;; |
|||
-rebuild) |
|||
rebuild=true |
|||
;; |
|||
-pack) |
|||
pack=true |
|||
;; |
|||
-test|-t) |
|||
test=true |
|||
;; |
|||
-integrationtest) |
|||
integration_test=true |
|||
;; |
|||
-performancetest) |
|||
performance_test=true |
|||
;; |
|||
-sign) |
|||
sign=true |
|||
;; |
|||
-publish) |
|||
publish=true |
|||
;; |
|||
-preparemachine) |
|||
prepare_machine=true |
|||
;; |
|||
-projects) |
|||
projects=$2 |
|||
shift |
|||
;; |
|||
-ci) |
|||
ci=true |
|||
;; |
|||
-warnaserror) |
|||
warn_as_error=$2 |
|||
shift |
|||
;; |
|||
-nodereuse) |
|||
node_reuse=$2 |
|||
shift |
|||
;; |
|||
*) |
|||
properties="$properties $1" |
|||
;; |
|||
esac |
|||
|
|||
shift |
|||
done |
|||
|
|||
if [[ "$ci" == true ]]; then |
|||
pipelines_log=true |
|||
binary_log=true |
|||
node_reuse=false |
|||
fi |
|||
|
|||
. "$scriptroot/tools.sh" |
|||
|
|||
function InitializeCustomToolset { |
|||
local script="$eng_root/restore-toolset.sh" |
|||
|
|||
if [[ -a "$script" ]]; then |
|||
. "$script" |
|||
fi |
|||
} |
|||
|
|||
function Build { |
|||
InitializeToolset |
|||
InitializeCustomToolset |
|||
|
|||
if [[ ! -z "$projects" ]]; then |
|||
properties="$properties /p:Projects=$projects" |
|||
fi |
|||
|
|||
local bl="" |
|||
if [[ "$binary_log" == true ]]; then |
|||
bl="/bl:\"$log_dir/Build.binlog\"" |
|||
fi |
|||
|
|||
MSBuild $_InitializeToolset \ |
|||
$bl \ |
|||
/p:Configuration=$configuration \ |
|||
/p:RepoRoot="$repo_root" \ |
|||
/p:Restore=$restore \ |
|||
/p:Build=$build \ |
|||
/p:Rebuild=$rebuild \ |
|||
/p:Test=$test \ |
|||
/p:Pack=$pack \ |
|||
/p:IntegrationTest=$integration_test \ |
|||
/p:PerformanceTest=$performance_test \ |
|||
/p:Sign=$sign \ |
|||
/p:Publish=$publish \ |
|||
$properties |
|||
|
|||
ExitWithExitCode 0 |
|||
} |
|||
|
|||
# Import custom tools configuration, if present in the repo. |
|||
configure_toolset_script="$eng_root/configure-toolset.sh" |
|||
if [[ -a "$configure_toolset_script" ]]; then |
|||
. "$configure_toolset_script" |
|||
fi |
|||
|
|||
# TODO: https://github.com/dotnet/arcade/issues/1468 |
|||
# Temporary workaround to avoid breaking change. |
|||
# Remove once repos are updated. |
|||
if [[ -n "${useInstalledDotNetCli:-}" ]]; then |
|||
use_installed_dotnet_cli="$useInstalledDotNetCli" |
|||
fi |
|||
|
|||
if [[ "$restore" == true && -z ${DisableNativeToolsetInstalls:-} ]]; then |
|||
InitializeNativeTools |
|||
fi |
|||
|
|||
Build |
|||
@ -0,0 +1,16 @@ |
|||
#!/usr/bin/env bash |
|||
|
|||
source="${BASH_SOURCE[0]}" |
|||
|
|||
# resolve $SOURCE until the file is no longer a symlink |
|||
while [[ -h $source ]]; do |
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
source="$(readlink "$source")" |
|||
|
|||
# if $source was a relative symlink, we need to resolve it relative to the path where |
|||
# the symlink file was located |
|||
[[ $source != /* ]] && source="$scriptroot/$source" |
|||
done |
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
|
|||
. "$scriptroot/build.sh" --restore --build --test --pack --publish --ci $@ |
|||
@ -0,0 +1,41 @@ |
|||
set(CROSS_NDK_TOOLCHAIN $ENV{ROOTFS_DIR}/../) |
|||
set(CROSS_ROOTFS ${CROSS_NDK_TOOLCHAIN}/sysroot) |
|||
set(CLR_CMAKE_PLATFORM_ANDROID "Android") |
|||
|
|||
set(CMAKE_SYSTEM_NAME Linux) |
|||
set(CMAKE_SYSTEM_VERSION 1) |
|||
set(CMAKE_SYSTEM_PROCESSOR arm) |
|||
|
|||
## Specify the toolchain |
|||
set(TOOLCHAIN "arm-linux-androideabi") |
|||
set(CMAKE_PREFIX_PATH ${CROSS_NDK_TOOLCHAIN}) |
|||
set(TOOLCHAIN_PREFIX ${TOOLCHAIN}-) |
|||
|
|||
find_program(CMAKE_C_COMPILER ${TOOLCHAIN_PREFIX}clang) |
|||
find_program(CMAKE_CXX_COMPILER ${TOOLCHAIN_PREFIX}clang++) |
|||
find_program(CMAKE_ASM_COMPILER ${TOOLCHAIN_PREFIX}clang) |
|||
find_program(CMAKE_AR ${TOOLCHAIN_PREFIX}ar) |
|||
find_program(CMAKE_LD ${TOOLCHAIN_PREFIX}ar) |
|||
find_program(CMAKE_OBJCOPY ${TOOLCHAIN_PREFIX}objcopy) |
|||
find_program(CMAKE_OBJDUMP ${TOOLCHAIN_PREFIX}objdump) |
|||
|
|||
add_compile_options(--sysroot=${CROSS_ROOTFS}) |
|||
add_compile_options(-fPIE) |
|||
add_compile_options(-mfloat-abi=soft) |
|||
include_directories(SYSTEM ${CROSS_NDK_TOOLCHAIN}/include/c++/4.9.x/) |
|||
include_directories(SYSTEM ${CROSS_NDK_TOOLCHAIN}/include/c++/4.9.x/arm-linux-androideabi/) |
|||
|
|||
set(CROSS_LINK_FLAGS "${CROSS_LINK_FLAGS} -B ${CROSS_ROOTFS}/usr/lib/gcc/${TOOLCHAIN}") |
|||
set(CROSS_LINK_FLAGS "${CROSS_LINK_FLAGS} -L${CROSS_ROOTFS}/lib/${TOOLCHAIN}") |
|||
set(CROSS_LINK_FLAGS "${CROSS_LINK_FLAGS} --sysroot=${CROSS_ROOTFS}") |
|||
set(CROSS_LINK_FLAGS "${CROSS_LINK_FLAGS} -fPIE -pie") |
|||
|
|||
set(CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} ${CROSS_LINK_FLAGS}" CACHE STRING "" FORCE) |
|||
set(CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS} ${CROSS_LINK_FLAGS}" CACHE STRING "" FORCE) |
|||
set(CMAKE_MODULE_LINKER_FLAGS "${CMAKE_MODULE_LINKER_FLAGS} ${CROSS_LINK_FLAGS}" CACHE STRING "" FORCE) |
|||
|
|||
set(CMAKE_FIND_ROOT_PATH "${CROSS_ROOTFS}") |
|||
set(CMAKE_FIND_ROOT_PATH_MODE_PROGRAM NEVER) |
|||
set(CMAKE_FIND_ROOT_PATH_MODE_LIBRARY ONLY) |
|||
set(CMAKE_FIND_ROOT_PATH_MODE_INCLUDE ONLY) |
|||
set(CMAKE_FIND_ROOT_PATH_MODE_PACKAGE ONLY) |
|||
@ -0,0 +1,42 @@ |
|||
set(CROSS_NDK_TOOLCHAIN $ENV{ROOTFS_DIR}/../) |
|||
set(CROSS_ROOTFS ${CROSS_NDK_TOOLCHAIN}/sysroot) |
|||
set(CLR_CMAKE_PLATFORM_ANDROID "Android") |
|||
|
|||
set(CMAKE_SYSTEM_NAME Linux) |
|||
set(CMAKE_SYSTEM_VERSION 1) |
|||
set(CMAKE_SYSTEM_PROCESSOR aarch64) |
|||
|
|||
## Specify the toolchain |
|||
set(TOOLCHAIN "aarch64-linux-android") |
|||
set(CMAKE_PREFIX_PATH ${CROSS_NDK_TOOLCHAIN}) |
|||
set(TOOLCHAIN_PREFIX ${TOOLCHAIN}-) |
|||
|
|||
find_program(CMAKE_C_COMPILER ${TOOLCHAIN_PREFIX}clang) |
|||
find_program(CMAKE_CXX_COMPILER ${TOOLCHAIN_PREFIX}clang++) |
|||
find_program(CMAKE_ASM_COMPILER ${TOOLCHAIN_PREFIX}clang) |
|||
find_program(CMAKE_AR ${TOOLCHAIN_PREFIX}ar) |
|||
find_program(CMAKE_LD ${TOOLCHAIN_PREFIX}ar) |
|||
find_program(CMAKE_OBJCOPY ${TOOLCHAIN_PREFIX}objcopy) |
|||
find_program(CMAKE_OBJDUMP ${TOOLCHAIN_PREFIX}objdump) |
|||
|
|||
add_compile_options(--sysroot=${CROSS_ROOTFS}) |
|||
add_compile_options(-fPIE) |
|||
|
|||
## Needed for Android or bionic specific conditionals |
|||
add_compile_options(-D__ANDROID__) |
|||
add_compile_options(-D__BIONIC__) |
|||
|
|||
set(CROSS_LINK_FLAGS "${CROSS_LINK_FLAGS} -B ${CROSS_ROOTFS}/usr/lib/gcc/${TOOLCHAIN}") |
|||
set(CROSS_LINK_FLAGS "${CROSS_LINK_FLAGS} -L${CROSS_ROOTFS}/lib/${TOOLCHAIN}") |
|||
set(CROSS_LINK_FLAGS "${CROSS_LINK_FLAGS} --sysroot=${CROSS_ROOTFS}") |
|||
set(CROSS_LINK_FLAGS "${CROSS_LINK_FLAGS} -fPIE -pie") |
|||
|
|||
set(CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} ${CROSS_LINK_FLAGS}" CACHE STRING "" FORCE) |
|||
set(CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS} ${CROSS_LINK_FLAGS}" CACHE STRING "" FORCE) |
|||
set(CMAKE_MODULE_LINKER_FLAGS "${CMAKE_MODULE_LINKER_FLAGS} ${CROSS_LINK_FLAGS}" CACHE STRING "" FORCE) |
|||
|
|||
set(CMAKE_FIND_ROOT_PATH "${CROSS_ROOTFS}") |
|||
set(CMAKE_FIND_ROOT_PATH_MODE_PROGRAM NEVER) |
|||
set(CMAKE_FIND_ROOT_PATH_MODE_LIBRARY ONLY) |
|||
set(CMAKE_FIND_ROOT_PATH_MODE_INCLUDE ONLY) |
|||
set(CMAKE_FIND_ROOT_PATH_MODE_PACKAGE ONLY) |
|||
@ -0,0 +1,11 @@ |
|||
deb http://ports.ubuntu.com/ubuntu-ports/ bionic main restricted universe |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ bionic main restricted universe |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ bionic-updates main restricted universe |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ bionic-updates main restricted universe |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ bionic-backports main restricted |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ bionic-backports main restricted |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ bionic-security main restricted universe multiverse |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ bionic-security main restricted universe multiverse |
|||
@ -0,0 +1,3 @@ |
|||
# Debian (sid) # UNSTABLE |
|||
deb http://ftp.debian.org/debian/ sid main contrib non-free |
|||
deb-src http://ftp.debian.org/debian/ sid main contrib non-free |
|||
@ -0,0 +1,11 @@ |
|||
deb http://ports.ubuntu.com/ubuntu-ports/ trusty main restricted universe |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ trusty main restricted universe |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ trusty-updates main restricted universe |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ trusty-updates main restricted universe |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ trusty-backports main restricted |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ trusty-backports main restricted |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ trusty-security main restricted universe multiverse |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ trusty-security main restricted universe multiverse |
|||
@ -0,0 +1,11 @@ |
|||
deb http://ports.ubuntu.com/ubuntu-ports/ xenial main restricted universe |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ xenial main restricted universe |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ xenial-updates main restricted universe |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ xenial-updates main restricted universe |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ xenial-backports main restricted |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ xenial-backports main restricted |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ xenial-security main restricted universe multiverse |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ xenial-security main restricted universe multiverse |
|||
@ -0,0 +1,11 @@ |
|||
deb http://ports.ubuntu.com/ubuntu-ports/ zesty main restricted universe |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ zesty main restricted universe |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ zesty-updates main restricted universe |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ zesty-updates main restricted universe |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ zesty-backports main restricted |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ zesty-backports main restricted |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ zesty-security main restricted universe multiverse |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ zesty-security main restricted universe multiverse |
|||
@ -0,0 +1,71 @@ |
|||
From e72c9d7ead60e3317bd6d1fade995c07021c947b Mon Sep 17 00:00:00 2001 |
|||
From: Mathieu Desnoyers <mathieu.desnoyers@efficios.com> |
|||
Date: Thu, 7 May 2015 13:25:04 -0400 |
|||
Subject: [PATCH] Fix: building probe providers with C++ compiler |
|||
|
|||
Robert Daniels wrote: |
|||
> > I'm attempting to use lttng userspace tracing with a C++ application |
|||
> > on an ARM platform. I'm using GCC 4.8.4 on Linux 3.14 with the 2.6 |
|||
> > release of lttng. I've compiled lttng-modules, lttng-ust, and |
|||
> > lttng-tools and have been able to get a simple test working with C |
|||
> > code. When I attempt to run the hello.cxx test on my target it will |
|||
> > segfault. |
|||
> |
|||
> |
|||
> I spent a little time digging into this issue and finally discovered the |
|||
> cause of my segfault with ARM C++ tracepoints. |
|||
> |
|||
> There is a struct called 'lttng_event' in ust-events.h which contains an |
|||
> empty union 'u'. This was the cause of my issue. Under C, this empty union |
|||
> compiles to a zero byte member while under C++ it compiles to a one byte |
|||
> member, and in my case was four-byte aligned which caused my C++ code to |
|||
> have the 'cds_list_head node' offset incorrectly by four bytes. This lead |
|||
> to an incorrect linked list structure which caused my issue. |
|||
> |
|||
> Since this union is empty, I simply removed it from the struct and everything |
|||
> worked correctly. |
|||
> |
|||
> I don't know the history or purpose behind this empty union so I'd like to |
|||
> know if this is a safe fix. If it is I can submit a patch with the union |
|||
> removed. |
|||
|
|||
That's a very nice catch! |
|||
|
|||
We do not support building tracepoint probe provider with |
|||
g++ yet, as stated in lttng-ust(3): |
|||
|
|||
"- Note for C++ support: although an application instrumented with |
|||
tracepoints can be compiled with g++, tracepoint probes should be |
|||
compiled with gcc (only tested with gcc so far)." |
|||
|
|||
However, if it works fine with this fix, then I'm tempted to take it, |
|||
especially because removing the empty union does not appear to affect |
|||
the layout of struct lttng_event as seen from liblttng-ust, which must |
|||
be compiled with a C compiler, and from probe providers compiled with |
|||
a C compiler. So all we are changing is the layout of a probe provider |
|||
compiled with a C++ compiler, which is anyway buggy at the moment, |
|||
because it is not compatible with the layout expected by liblttng-ust |
|||
compiled with a C compiler. |
|||
|
|||
Reported-by: Robert Daniels <robert.daniels@vantagecontrols.com> |
|||
Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com> |
|||
---
|
|||
include/lttng/ust-events.h | 2 -- |
|||
1 file changed, 2 deletions(-) |
|||
|
|||
diff --git a/usr/include/lttng/ust-events.h b/usr/include/lttng/ust-events.h
|
|||
index 328a875..3d7a274 100644
|
|||
--- a/usr/include/lttng/ust-events.h
|
|||
+++ b/usr/include/lttng/ust-events.h
|
|||
@@ -407,8 +407,6 @@ struct lttng_event {
|
|||
void *_deprecated1; |
|||
struct lttng_ctx *ctx; |
|||
enum lttng_ust_instrumentation instrumentation; |
|||
- union {
|
|||
- } u;
|
|||
struct cds_list_head node; /* Event list in session */ |
|||
struct cds_list_head _deprecated2; |
|||
void *_deprecated3; |
|||
--
|
|||
2.7.4 |
|||
|
|||
@ -0,0 +1,97 @@ |
|||
diff -u -r a/usr/include/urcu/uatomic/generic.h b/usr/include/urcu/uatomic/generic.h
|
|||
--- a/usr/include/urcu/uatomic/generic.h 2014-03-28 06:04:42.000000000 +0900
|
|||
+++ b/usr/include/urcu/uatomic/generic.h 2017-02-13 10:35:21.189927116 +0900
|
|||
@@ -65,17 +65,17 @@
|
|||
switch (len) { |
|||
#ifdef UATOMIC_HAS_ATOMIC_BYTE |
|||
case 1: |
|||
- return __sync_val_compare_and_swap_1(addr, old, _new);
|
|||
+ return __sync_val_compare_and_swap_1((uint8_t *) addr, old, _new);
|
|||
#endif |
|||
#ifdef UATOMIC_HAS_ATOMIC_SHORT |
|||
case 2: |
|||
- return __sync_val_compare_and_swap_2(addr, old, _new);
|
|||
+ return __sync_val_compare_and_swap_2((uint16_t *) addr, old, _new);
|
|||
#endif |
|||
case 4: |
|||
- return __sync_val_compare_and_swap_4(addr, old, _new);
|
|||
+ return __sync_val_compare_and_swap_4((uint32_t *) addr, old, _new);
|
|||
#if (CAA_BITS_PER_LONG == 64) |
|||
case 8: |
|||
- return __sync_val_compare_and_swap_8(addr, old, _new);
|
|||
+ return __sync_val_compare_and_swap_8((uint64_t *) addr, old, _new);
|
|||
#endif |
|||
} |
|||
_uatomic_link_error(); |
|||
@@ -100,20 +100,20 @@
|
|||
switch (len) { |
|||
#ifdef UATOMIC_HAS_ATOMIC_BYTE |
|||
case 1: |
|||
- __sync_and_and_fetch_1(addr, val);
|
|||
+ __sync_and_and_fetch_1((uint8_t *) addr, val);
|
|||
return; |
|||
#endif |
|||
#ifdef UATOMIC_HAS_ATOMIC_SHORT |
|||
case 2: |
|||
- __sync_and_and_fetch_2(addr, val);
|
|||
+ __sync_and_and_fetch_2((uint16_t *) addr, val);
|
|||
return; |
|||
#endif |
|||
case 4: |
|||
- __sync_and_and_fetch_4(addr, val);
|
|||
+ __sync_and_and_fetch_4((uint32_t *) addr, val);
|
|||
return; |
|||
#if (CAA_BITS_PER_LONG == 64) |
|||
case 8: |
|||
- __sync_and_and_fetch_8(addr, val);
|
|||
+ __sync_and_and_fetch_8((uint64_t *) addr, val);
|
|||
return; |
|||
#endif |
|||
} |
|||
@@ -139,20 +139,20 @@
|
|||
switch (len) { |
|||
#ifdef UATOMIC_HAS_ATOMIC_BYTE |
|||
case 1: |
|||
- __sync_or_and_fetch_1(addr, val);
|
|||
+ __sync_or_and_fetch_1((uint8_t *) addr, val);
|
|||
return; |
|||
#endif |
|||
#ifdef UATOMIC_HAS_ATOMIC_SHORT |
|||
case 2: |
|||
- __sync_or_and_fetch_2(addr, val);
|
|||
+ __sync_or_and_fetch_2((uint16_t *) addr, val);
|
|||
return; |
|||
#endif |
|||
case 4: |
|||
- __sync_or_and_fetch_4(addr, val);
|
|||
+ __sync_or_and_fetch_4((uint32_t *) addr, val);
|
|||
return; |
|||
#if (CAA_BITS_PER_LONG == 64) |
|||
case 8: |
|||
- __sync_or_and_fetch_8(addr, val);
|
|||
+ __sync_or_and_fetch_8((uint64_t *) addr, val);
|
|||
return; |
|||
#endif |
|||
} |
|||
@@ -180,17 +180,17 @@
|
|||
switch (len) { |
|||
#ifdef UATOMIC_HAS_ATOMIC_BYTE |
|||
case 1: |
|||
- return __sync_add_and_fetch_1(addr, val);
|
|||
+ return __sync_add_and_fetch_1((uint8_t *) addr, val);
|
|||
#endif |
|||
#ifdef UATOMIC_HAS_ATOMIC_SHORT |
|||
case 2: |
|||
- return __sync_add_and_fetch_2(addr, val);
|
|||
+ return __sync_add_and_fetch_2((uint16_t *) addr, val);
|
|||
#endif |
|||
case 4: |
|||
- return __sync_add_and_fetch_4(addr, val);
|
|||
+ return __sync_add_and_fetch_4((uint32_t *) addr, val);
|
|||
#if (CAA_BITS_PER_LONG == 64) |
|||
case 8: |
|||
- return __sync_add_and_fetch_8(addr, val);
|
|||
+ return __sync_add_and_fetch_8((uint64_t *) addr, val);
|
|||
#endif |
|||
} |
|||
_uatomic_link_error(); |
|||
@ -0,0 +1,11 @@ |
|||
deb http://ports.ubuntu.com/ubuntu-ports/ bionic main restricted universe |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ bionic main restricted universe |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ bionic-updates main restricted universe |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ bionic-updates main restricted universe |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ bionic-backports main restricted |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ bionic-backports main restricted |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ bionic-security main restricted universe multiverse |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ bionic-security main restricted universe multiverse |
|||
@ -0,0 +1,11 @@ |
|||
deb http://deb.debian.org/debian buster main |
|||
deb-src http://deb.debian.org/debian buster main |
|||
|
|||
deb http://deb.debian.org/debian-security/ buster/updates main |
|||
deb-src http://deb.debian.org/debian-security/ buster/updates main |
|||
|
|||
deb http://deb.debian.org/debian buster-updates main |
|||
deb-src http://deb.debian.org/debian buster-updates main |
|||
|
|||
deb http://deb.debian.org/debian buster-backports main contrib non-free |
|||
deb-src http://deb.debian.org/debian buster-backports main contrib non-free |
|||
@ -0,0 +1,12 @@ |
|||
deb http://deb.debian.org/debian stretch main |
|||
deb-src http://deb.debian.org/debian stretch main |
|||
|
|||
deb http://deb.debian.org/debian-security/ stretch/updates main |
|||
deb-src http://deb.debian.org/debian-security/ stretch/updates main |
|||
|
|||
deb http://deb.debian.org/debian stretch-updates main |
|||
deb-src http://deb.debian.org/debian stretch-updates main |
|||
|
|||
deb http://deb.debian.org/debian stretch-backports main contrib non-free |
|||
deb-src http://deb.debian.org/debian stretch-backports main contrib non-free |
|||
|
|||
@ -0,0 +1,11 @@ |
|||
deb http://ports.ubuntu.com/ubuntu-ports/ trusty main restricted universe |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ trusty main restricted universe |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ trusty-updates main restricted universe |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ trusty-updates main restricted universe |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ trusty-backports main restricted |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ trusty-backports main restricted |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ trusty-security main restricted universe multiverse |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ trusty-security main restricted universe multiverse |
|||
@ -0,0 +1,11 @@ |
|||
deb http://ports.ubuntu.com/ubuntu-ports/ xenial main restricted universe |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ xenial main restricted universe |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ xenial-updates main restricted universe |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ xenial-updates main restricted universe |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ xenial-backports main restricted |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ xenial-backports main restricted |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ xenial-security main restricted universe multiverse |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ xenial-security main restricted universe multiverse |
|||
@ -0,0 +1,11 @@ |
|||
deb http://ports.ubuntu.com/ubuntu-ports/ zesty main restricted universe |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ zesty main restricted universe |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ zesty-updates main restricted universe |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ zesty-updates main restricted universe |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ zesty-backports main restricted |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ zesty-backports main restricted |
|||
|
|||
deb http://ports.ubuntu.com/ubuntu-ports/ zesty-security main restricted universe multiverse |
|||
deb-src http://ports.ubuntu.com/ubuntu-ports/ zesty-security main restricted universe multiverse |
|||
@ -0,0 +1,3 @@ |
|||
# Debian (jessie) # Stable |
|||
deb http://ftp.debian.org/debian/ jessie main contrib non-free |
|||
deb-src http://ftp.debian.org/debian/ jessie main contrib non-free |
|||
@ -0,0 +1,44 @@ |
|||
#!/usr/bin/env bash |
|||
set -e |
|||
|
|||
__ARM_SOFTFP_CrossDir=$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd ) |
|||
__TIZEN_CROSSDIR="$__ARM_SOFTFP_CrossDir/tizen" |
|||
|
|||
if [[ -z "$ROOTFS_DIR" ]]; then |
|||
echo "ROOTFS_DIR is not defined." |
|||
exit 1; |
|||
fi |
|||
|
|||
# Clean-up (TODO-Cleanup: We may already delete $ROOTFS_DIR at ./cross/build-rootfs.sh.) |
|||
# hk0110 |
|||
if [ -d "$ROOTFS_DIR" ]; then |
|||
umount $ROOTFS_DIR/* |
|||
rm -rf $ROOTFS_DIR |
|||
fi |
|||
|
|||
TIZEN_TMP_DIR=$ROOTFS_DIR/tizen_tmp |
|||
mkdir -p $TIZEN_TMP_DIR |
|||
|
|||
# Download files |
|||
echo ">>Start downloading files" |
|||
VERBOSE=1 $__ARM_SOFTFP_CrossDir/tizen-fetch.sh $TIZEN_TMP_DIR |
|||
echo "<<Finish downloading files" |
|||
|
|||
echo ">>Start constructing Tizen rootfs" |
|||
TIZEN_RPM_FILES=`ls $TIZEN_TMP_DIR/*.rpm` |
|||
cd $ROOTFS_DIR |
|||
for f in $TIZEN_RPM_FILES; do |
|||
rpm2cpio $f | cpio -idm --quiet |
|||
done |
|||
echo "<<Finish constructing Tizen rootfs" |
|||
|
|||
# Cleanup tmp |
|||
rm -rf $TIZEN_TMP_DIR |
|||
|
|||
# Configure Tizen rootfs |
|||
echo ">>Start configuring Tizen rootfs" |
|||
rm ./usr/lib/libunwind.so |
|||
ln -s libunwind.so.8 ./usr/lib/libunwind.so |
|||
ln -sfn asm-arm ./usr/include/asm |
|||
patch -p1 < $__TIZEN_CROSSDIR/tizen.patch |
|||
echo "<<Finish configuring Tizen rootfs" |
|||
@ -0,0 +1,171 @@ |
|||
#!/usr/bin/env bash |
|||
set -e |
|||
|
|||
if [[ -z "${VERBOSE// }" ]] || [ "$VERBOSE" -ne "$VERBOSE" ] 2>/dev/null; then |
|||
VERBOSE=0 |
|||
fi |
|||
|
|||
Log() |
|||
{ |
|||
if [ $VERBOSE -ge $1 ]; then |
|||
echo ${@:2} |
|||
fi |
|||
} |
|||
|
|||
Inform() |
|||
{ |
|||
Log 1 -e "\x1B[0;34m$@\x1B[m" |
|||
} |
|||
|
|||
Debug() |
|||
{ |
|||
Log 2 -e "\x1B[0;32m$@\x1B[m" |
|||
} |
|||
|
|||
Error() |
|||
{ |
|||
>&2 Log 0 -e "\x1B[0;31m$@\x1B[m" |
|||
} |
|||
|
|||
Fetch() |
|||
{ |
|||
URL=$1 |
|||
FILE=$2 |
|||
PROGRESS=$3 |
|||
if [ $VERBOSE -ge 1 ] && [ $PROGRESS ]; then |
|||
CURL_OPT="--progress-bar" |
|||
else |
|||
CURL_OPT="--silent" |
|||
fi |
|||
curl $CURL_OPT $URL > $FILE |
|||
} |
|||
|
|||
hash curl 2> /dev/null || { Error "Require 'curl' Aborting."; exit 1; } |
|||
hash xmllint 2> /dev/null || { Error "Require 'xmllint' Aborting."; exit 1; } |
|||
hash sha256sum 2> /dev/null || { Error "Require 'sha256sum' Aborting."; exit 1; } |
|||
|
|||
TMPDIR=$1 |
|||
if [ ! -d $TMPDIR ]; then |
|||
TMPDIR=./tizen_tmp |
|||
Debug "Create temporary directory : $TMPDIR" |
|||
mkdir -p $TMPDIR |
|||
fi |
|||
|
|||
TIZEN_URL=http://download.tizen.org/releases/milestone/tizen |
|||
BUILD_XML=build.xml |
|||
REPOMD_XML=repomd.xml |
|||
PRIMARY_XML=primary.xml |
|||
TARGET_URL="http://__not_initialized" |
|||
|
|||
Xpath_get() |
|||
{ |
|||
XPATH_RESULT='' |
|||
XPATH=$1 |
|||
XML_FILE=$2 |
|||
RESULT=$(xmllint --xpath $XPATH $XML_FILE) |
|||
if [[ -z ${RESULT// } ]]; then |
|||
Error "Can not find target from $XML_FILE" |
|||
Debug "Xpath = $XPATH" |
|||
exit 1 |
|||
fi |
|||
XPATH_RESULT=$RESULT |
|||
} |
|||
|
|||
fetch_tizen_pkgs_init() |
|||
{ |
|||
TARGET=$1 |
|||
PROFILE=$2 |
|||
Debug "Initialize TARGET=$TARGET, PROFILE=$PROFILE" |
|||
|
|||
TMP_PKG_DIR=$TMPDIR/tizen_${PROFILE}_pkgs |
|||
if [ -d $TMP_PKG_DIR ]; then rm -rf $TMP_PKG_DIR; fi |
|||
mkdir -p $TMP_PKG_DIR |
|||
|
|||
PKG_URL=$TIZEN_URL/$PROFILE/latest |
|||
|
|||
BUILD_XML_URL=$PKG_URL/$BUILD_XML |
|||
TMP_BUILD=$TMP_PKG_DIR/$BUILD_XML |
|||
TMP_REPOMD=$TMP_PKG_DIR/$REPOMD_XML |
|||
TMP_PRIMARY=$TMP_PKG_DIR/$PRIMARY_XML |
|||
TMP_PRIMARYGZ=${TMP_PRIMARY}.gz |
|||
|
|||
Fetch $BUILD_XML_URL $TMP_BUILD |
|||
|
|||
Debug "fetch $BUILD_XML_URL to $TMP_BUILD" |
|||
|
|||
TARGET_XPATH="//build/buildtargets/buildtarget[@name=\"$TARGET\"]/repo[@type=\"binary\"]/text()" |
|||
Xpath_get $TARGET_XPATH $TMP_BUILD |
|||
TARGET_PATH=$XPATH_RESULT |
|||
TARGET_URL=$PKG_URL/$TARGET_PATH |
|||
|
|||
REPOMD_URL=$TARGET_URL/repodata/repomd.xml |
|||
PRIMARY_XPATH='string(//*[local-name()="data"][@type="primary"]/*[local-name()="location"]/@href)' |
|||
|
|||
Fetch $REPOMD_URL $TMP_REPOMD |
|||
|
|||
Debug "fetch $REPOMD_URL to $TMP_REPOMD" |
|||
|
|||
Xpath_get $PRIMARY_XPATH $TMP_REPOMD |
|||
PRIMARY_XML_PATH=$XPATH_RESULT |
|||
PRIMARY_URL=$TARGET_URL/$PRIMARY_XML_PATH |
|||
|
|||
Fetch $PRIMARY_URL $TMP_PRIMARYGZ |
|||
|
|||
Debug "fetch $PRIMARY_URL to $TMP_PRIMARYGZ" |
|||
|
|||
gunzip $TMP_PRIMARYGZ |
|||
|
|||
Debug "unzip $TMP_PRIMARYGZ to $TMP_PRIMARY" |
|||
} |
|||
|
|||
fetch_tizen_pkgs() |
|||
{ |
|||
ARCH=$1 |
|||
PACKAGE_XPATH_TPL='string(//*[local-name()="metadata"]/*[local-name()="package"][*[local-name()="name"][text()="_PKG_"]][*[local-name()="arch"][text()="_ARCH_"]]/*[local-name()="location"]/@href)' |
|||
|
|||
PACKAGE_CHECKSUM_XPATH_TPL='string(//*[local-name()="metadata"]/*[local-name()="package"][*[local-name()="name"][text()="_PKG_"]][*[local-name()="arch"][text()="_ARCH_"]]/*[local-name()="checksum"]/text())' |
|||
|
|||
for pkg in ${@:2} |
|||
do |
|||
Inform "Fetching... $pkg" |
|||
XPATH=${PACKAGE_XPATH_TPL/_PKG_/$pkg} |
|||
XPATH=${XPATH/_ARCH_/$ARCH} |
|||
Xpath_get $XPATH $TMP_PRIMARY |
|||
PKG_PATH=$XPATH_RESULT |
|||
|
|||
XPATH=${PACKAGE_CHECKSUM_XPATH_TPL/_PKG_/$pkg} |
|||
XPATH=${XPATH/_ARCH_/$ARCH} |
|||
Xpath_get $XPATH $TMP_PRIMARY |
|||
CHECKSUM=$XPATH_RESULT |
|||
|
|||
PKG_URL=$TARGET_URL/$PKG_PATH |
|||
PKG_FILE=$(basename $PKG_PATH) |
|||
PKG_PATH=$TMPDIR/$PKG_FILE |
|||
|
|||
Debug "Download $PKG_URL to $PKG_PATH" |
|||
Fetch $PKG_URL $PKG_PATH true |
|||
|
|||
echo "$CHECKSUM $PKG_PATH" | sha256sum -c - > /dev/null |
|||
if [ $? -ne 0 ]; then |
|||
Error "Fail to fetch $PKG_URL to $PKG_PATH" |
|||
Debug "Checksum = $CHECKSUM" |
|||
exit 1 |
|||
fi |
|||
done |
|||
} |
|||
|
|||
Inform "Initialize arm base" |
|||
fetch_tizen_pkgs_init standard base |
|||
Inform "fetch common packages" |
|||
fetch_tizen_pkgs armv7l gcc glibc glibc-devel libicu libicu-devel libatomic |
|||
fetch_tizen_pkgs noarch linux-glibc-devel |
|||
Inform "fetch coreclr packages" |
|||
fetch_tizen_pkgs armv7l lldb lldb-devel libgcc libstdc++ libstdc++-devel libunwind libunwind-devel lttng-ust-devel lttng-ust userspace-rcu-devel userspace-rcu |
|||
Inform "fetch corefx packages" |
|||
fetch_tizen_pkgs armv7l libcom_err libcom_err-devel zlib zlib-devel libopenssl libopenssl-devel krb5 krb5-devel libcurl libcurl-devel |
|||
|
|||
Inform "Initialize standard unified" |
|||
fetch_tizen_pkgs_init standard unified |
|||
Inform "fetch corefx packages" |
|||
fetch_tizen_pkgs armv7l gssdp gssdp-devel tizen-release |
|||
|
|||
@ -0,0 +1,50 @@ |
|||
lang en_US.UTF-8 |
|||
keyboard us |
|||
timezone --utc Asia/Seoul |
|||
|
|||
part / --fstype="ext4" --size=3500 --ondisk=mmcblk0 --label rootfs --fsoptions=defaults,noatime |
|||
|
|||
rootpw tizen |
|||
desktop --autologinuser=root |
|||
user --name root --groups audio,video --password 'tizen' |
|||
|
|||
repo --name=standard --baseurl=http://download.tizen.org/releases/milestone/tizen/unified/latest/repos/standard/packages/ --ssl_verify=no |
|||
repo --name=base --baseurl=http://download.tizen.org/releases/milestone/tizen/base/latest/repos/standard/packages/ --ssl_verify=no |
|||
|
|||
%packages |
|||
tar |
|||
gzip |
|||
|
|||
sed |
|||
grep |
|||
gawk |
|||
perl |
|||
|
|||
binutils |
|||
findutils |
|||
util-linux |
|||
lttng-ust |
|||
userspace-rcu |
|||
procps-ng |
|||
tzdata |
|||
ca-certificates |
|||
|
|||
|
|||
### Core FX |
|||
libicu |
|||
libunwind |
|||
iputils |
|||
zlib |
|||
krb5 |
|||
libcurl |
|||
libopenssl |
|||
|
|||
%end |
|||
|
|||
%post |
|||
|
|||
### Update /tmp privilege |
|||
chmod 777 /tmp |
|||
#################################### |
|||
|
|||
%end |
|||
@ -0,0 +1,18 @@ |
|||
diff -u -r a/usr/lib/libc.so b/usr/lib/libc.so
|
|||
--- a/usr/lib/libc.so 2016-12-30 23:00:08.284951863 +0900
|
|||
+++ b/usr/lib/libc.so 2016-12-30 23:00:32.140951815 +0900
|
|||
@@ -2,4 +2,4 @@
|
|||
Use the shared library, but some functions are only in |
|||
the static library, so try that secondarily. */ |
|||
OUTPUT_FORMAT(elf32-littlearm) |
|||
-GROUP ( /lib/libc.so.6 /usr/lib/libc_nonshared.a AS_NEEDED ( /lib/ld-linux.so.3 ) )
|
|||
+GROUP ( libc.so.6 libc_nonshared.a AS_NEEDED ( ld-linux.so.3 ) )
|
|||
diff -u -r a/usr/lib/libpthread.so b/usr/lib/libpthread.so
|
|||
--- a/usr/lib/libpthread.so 2016-12-30 23:00:19.408951841 +0900
|
|||
+++ b/usr/lib/libpthread.so 2016-12-30 23:00:39.068951801 +0900
|
|||
@@ -2,4 +2,4 @@
|
|||
Use the shared library, but some functions are only in |
|||
the static library, so try that secondarily. */ |
|||
OUTPUT_FORMAT(elf32-littlearm) |
|||
-GROUP ( /lib/libpthread.so.0 /usr/lib/libpthread_nonshared.a )
|
|||
+GROUP ( libpthread.so.0 libpthread_nonshared.a )
|
|||
@ -0,0 +1,137 @@ |
|||
#!/usr/bin/env bash |
|||
set -e |
|||
__NDK_Version=r14 |
|||
|
|||
usage() |
|||
{ |
|||
echo "Creates a toolchain and sysroot used for cross-compiling for Android." |
|||
echo. |
|||
echo "Usage: $0 [BuildArch] [ApiLevel]" |
|||
echo. |
|||
echo "BuildArch is the target architecture of Android. Currently only arm64 is supported." |
|||
echo "ApiLevel is the target Android API level. API levels usually match to Android releases. See https://source.android.com/source/build-numbers.html" |
|||
echo. |
|||
echo "By default, the toolchain and sysroot will be generated in cross/android-rootfs/toolchain/[BuildArch]. You can change this behavior" |
|||
echo "by setting the TOOLCHAIN_DIR environment variable" |
|||
echo. |
|||
echo "By default, the NDK will be downloaded into the cross/android-rootfs/android-ndk-$__NDK_Version directory. If you already have an NDK installation," |
|||
echo "you can set the NDK_DIR environment variable to have this script use that installation of the NDK." |
|||
echo "By default, this script will generate a file, android_platform, in the root of the ROOTFS_DIR directory that contains the RID for the supported and tested Android build: android.21-arm64. This file is to replace '/etc/os-release', which is not available for Android." |
|||
exit 1 |
|||
} |
|||
|
|||
__ApiLevel=21 # The minimum platform for arm64 is API level 21 |
|||
__BuildArch=arm64 |
|||
__AndroidArch=aarch64 |
|||
__AndroidToolchain=aarch64-linux-android |
|||
|
|||
for i in "$@" |
|||
do |
|||
lowerI="$(echo $i | awk '{print tolower($0)}')" |
|||
case $lowerI in |
|||
-?|-h|--help) |
|||
usage |
|||
exit 1 |
|||
;; |
|||
arm64) |
|||
__BuildArch=arm64 |
|||
__AndroidArch=aarch64 |
|||
__AndroidToolchain=aarch64-linux-android |
|||
;; |
|||
arm) |
|||
__BuildArch=arm |
|||
__AndroidArch=arm |
|||
__AndroidToolchain=arm-linux-androideabi |
|||
;; |
|||
*[0-9]) |
|||
__ApiLevel=$i |
|||
;; |
|||
*) |
|||
__UnprocessedBuildArgs="$__UnprocessedBuildArgs $i" |
|||
;; |
|||
esac |
|||
done |
|||
|
|||
# Obtain the location of the bash script to figure out where the root of the repo is. |
|||
__CrossDir="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )" |
|||
|
|||
__Android_Cross_Dir="$__CrossDir/android-rootfs" |
|||
__NDK_Dir="$__Android_Cross_Dir/android-ndk-$__NDK_Version" |
|||
__libunwind_Dir="$__Android_Cross_Dir/libunwind" |
|||
__lldb_Dir="$__Android_Cross_Dir/lldb" |
|||
__ToolchainDir="$__Android_Cross_Dir/toolchain/$__BuildArch" |
|||
|
|||
if [[ -n "$TOOLCHAIN_DIR" ]]; then |
|||
__ToolchainDir=$TOOLCHAIN_DIR |
|||
fi |
|||
|
|||
if [[ -n "$NDK_DIR" ]]; then |
|||
__NDK_Dir=$NDK_DIR |
|||
fi |
|||
|
|||
echo "Target API level: $__ApiLevel" |
|||
echo "Target architecture: $__BuildArch" |
|||
echo "NDK location: $__NDK_Dir" |
|||
echo "Target Toolchain location: $__ToolchainDir" |
|||
|
|||
# Download the NDK if required |
|||
if [ ! -d $__NDK_Dir ]; then |
|||
echo Downloading the NDK into $__NDK_Dir |
|||
mkdir -p $__NDK_Dir |
|||
wget -nv -nc --show-progress https://dl.google.com/android/repository/android-ndk-$__NDK_Version-linux-x86_64.zip -O $__Android_Cross_Dir/android-ndk-$__NDK_Version-linux-x86_64.zip |
|||
unzip -q $__Android_Cross_Dir/android-ndk-$__NDK_Version-linux-x86_64.zip -d $__Android_Cross_Dir |
|||
fi |
|||
|
|||
if [ ! -d $__lldb_Dir ]; then |
|||
mkdir -p $__lldb_Dir |
|||
echo Downloading LLDB into $__lldb_Dir |
|||
wget -nv -nc --show-progress https://dl.google.com/android/repository/lldb-2.3.3614996-linux-x86_64.zip -O $__Android_Cross_Dir/lldb-2.3.3614996-linux-x86_64.zip |
|||
unzip -q $__Android_Cross_Dir/lldb-2.3.3614996-linux-x86_64.zip -d $__lldb_Dir |
|||
fi |
|||
|
|||
# Create the RootFS for both arm64 as well as aarch |
|||
rm -rf $__Android_Cross_Dir/toolchain |
|||
|
|||
echo Generating the $__BuildArch toolchain |
|||
$__NDK_Dir/build/tools/make_standalone_toolchain.py --arch $__BuildArch --api $__ApiLevel --install-dir $__ToolchainDir |
|||
|
|||
# Install the required packages into the toolchain |
|||
# TODO: Add logic to get latest pkg version instead of specific version number |
|||
rm -rf $__Android_Cross_Dir/deb/ |
|||
rm -rf $__Android_Cross_Dir/tmp |
|||
|
|||
mkdir -p $__Android_Cross_Dir/deb/ |
|||
mkdir -p $__Android_Cross_Dir/tmp/$arch/ |
|||
wget -nv -nc http://termux.net/dists/stable/main/binary-$__AndroidArch/libicu_60.2_$__AndroidArch.deb -O $__Android_Cross_Dir/deb/libicu_60.2_$__AndroidArch.deb |
|||
wget -nv -nc http://termux.net/dists/stable/main/binary-$__AndroidArch/libicu-dev_60.2_$__AndroidArch.deb -O $__Android_Cross_Dir/deb/libicu-dev_60.2_$__AndroidArch.deb |
|||
|
|||
wget -nv -nc http://termux.net/dists/stable/main/binary-$__AndroidArch/libandroid-glob-dev_0.4_$__AndroidArch.deb -O $__Android_Cross_Dir/deb/libandroid-glob-dev_0.4_$__AndroidArch.deb |
|||
wget -nv -nc http://termux.net/dists/stable/main/binary-$__AndroidArch/libandroid-glob_0.4_$__AndroidArch.deb -O $__Android_Cross_Dir/deb/libandroid-glob_0.4_$__AndroidArch.deb |
|||
wget -nv -nc http://termux.net/dists/stable/main/binary-$__AndroidArch/libandroid-support-dev_22_$__AndroidArch.deb -O $__Android_Cross_Dir/deb/libandroid-support-dev_22_$__AndroidArch.deb |
|||
wget -nv -nc http://termux.net/dists/stable/main/binary-$__AndroidArch/libandroid-support_22_$__AndroidArch.deb -O $__Android_Cross_Dir/deb/libandroid-support_22_$__AndroidArch.deb |
|||
wget -nv -nc http://termux.net/dists/stable/main/binary-$__AndroidArch/liblzma-dev_5.2.3_$__AndroidArch.deb -O $__Android_Cross_Dir/deb/liblzma-dev_5.2.3_$__AndroidArch.deb |
|||
wget -nv -nc http://termux.net/dists/stable/main/binary-$__AndroidArch/liblzma_5.2.3_$__AndroidArch.deb -O $__Android_Cross_Dir/deb/liblzma_5.2.3_$__AndroidArch.deb |
|||
wget -nv -nc http://termux.net/dists/stable/main/binary-$__AndroidArch/libunwind-dev_1.2.20170304_$__AndroidArch.deb -O $__Android_Cross_Dir/deb/libunwind-dev_1.2.20170304_$__AndroidArch.deb |
|||
wget -nv -nc http://termux.net/dists/stable/main/binary-$__AndroidArch/libunwind_1.2.20170304_$__AndroidArch.deb -O $__Android_Cross_Dir/deb/libunwind_1.2.20170304_$__AndroidArch.deb |
|||
|
|||
echo Unpacking Termux packages |
|||
dpkg -x $__Android_Cross_Dir/deb/libicu_60.2_$__AndroidArch.deb $__Android_Cross_Dir/tmp/$__AndroidArch/ |
|||
dpkg -x $__Android_Cross_Dir/deb/libicu-dev_60.2_$__AndroidArch.deb $__Android_Cross_Dir/tmp/$__AndroidArch/ |
|||
dpkg -x $__Android_Cross_Dir/deb/libandroid-glob-dev_0.4_$__AndroidArch.deb $__Android_Cross_Dir/tmp/$__AndroidArch/ |
|||
dpkg -x $__Android_Cross_Dir/deb/libandroid-glob_0.4_$__AndroidArch.deb $__Android_Cross_Dir/tmp/$__AndroidArch/ |
|||
dpkg -x $__Android_Cross_Dir/deb/libandroid-support-dev_22_$__AndroidArch.deb $__Android_Cross_Dir/tmp/$__AndroidArch/ |
|||
dpkg -x $__Android_Cross_Dir/deb/libandroid-support_22_$__AndroidArch.deb $__Android_Cross_Dir/tmp/$__AndroidArch/ |
|||
dpkg -x $__Android_Cross_Dir/deb/liblzma-dev_5.2.3_$__AndroidArch.deb $__Android_Cross_Dir/tmp/$__AndroidArch/ |
|||
dpkg -x $__Android_Cross_Dir/deb/liblzma_5.2.3_$__AndroidArch.deb $__Android_Cross_Dir/tmp/$__AndroidArch/ |
|||
dpkg -x $__Android_Cross_Dir/deb/libunwind-dev_1.2.20170304_$__AndroidArch.deb $__Android_Cross_Dir/tmp/$__AndroidArch/ |
|||
dpkg -x $__Android_Cross_Dir/deb/libunwind_1.2.20170304_$__AndroidArch.deb $__Android_Cross_Dir/tmp/$__AndroidArch/ |
|||
|
|||
cp -R $__Android_Cross_Dir/tmp/$__AndroidArch/data/data/com.termux/files/usr/* $__ToolchainDir/sysroot/usr/ |
|||
|
|||
# Generate platform file for build.sh script to assign to __DistroRid |
|||
echo "Generating platform file..." |
|||
|
|||
echo "RID=android.21-arm64" > $__ToolchainDir/sysroot/android_platform |
|||
echo Now run: |
|||
echo CONFIG_DIR=\`realpath cross/android/$__BuildArch\` ROOTFS_DIR=\`realpath $__ToolchainDir/sysroot\` ./build.sh cross $__BuildArch skipgenerateversion skipnuget cmakeargs -DENABLE_LLDBPLUGIN=0 |
|||
|
|||
@ -0,0 +1,234 @@ |
|||
#!/usr/bin/env bash |
|||
|
|||
usage() |
|||
{ |
|||
echo "Usage: $0 [BuildArch] [LinuxCodeName] [lldbx.y] [--skipunmount] --rootfsdir <directory>]" |
|||
echo "BuildArch can be: arm(default), armel, arm64, x86" |
|||
echo "LinuxCodeName - optional, Code name for Linux, can be: trusty, xenial(default), zesty, bionic, alpine. If BuildArch is armel, LinuxCodeName is jessie(default) or tizen." |
|||
echo "lldbx.y - optional, LLDB version, can be: lldb3.9(default), lldb4.0, lldb5.0, lldb6.0 no-lldb. Ignored for alpine" |
|||
echo "--skipunmount - optional, will skip the unmount of rootfs folder." |
|||
exit 1 |
|||
} |
|||
|
|||
__LinuxCodeName=xenial |
|||
__CrossDir=$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd ) |
|||
__InitialDir=$PWD |
|||
__BuildArch=arm |
|||
__UbuntuArch=armhf |
|||
__UbuntuRepo="http://ports.ubuntu.com/" |
|||
__LLDB_Package="liblldb-3.9-dev" |
|||
__SkipUnmount=0 |
|||
|
|||
# base development support |
|||
__UbuntuPackages="build-essential" |
|||
|
|||
__AlpinePackages="alpine-base" |
|||
__AlpinePackages+=" build-base" |
|||
__AlpinePackages+=" linux-headers" |
|||
__AlpinePackages+=" lldb-dev" |
|||
__AlpinePackages+=" llvm-dev" |
|||
|
|||
# symlinks fixer |
|||
__UbuntuPackages+=" symlinks" |
|||
|
|||
# CoreCLR and CoreFX dependencies |
|||
__UbuntuPackages+=" libicu-dev" |
|||
__UbuntuPackages+=" liblttng-ust-dev" |
|||
__UbuntuPackages+=" libunwind8-dev" |
|||
|
|||
__AlpinePackages+=" gettext-dev" |
|||
__AlpinePackages+=" icu-dev" |
|||
__AlpinePackages+=" libunwind-dev" |
|||
__AlpinePackages+=" lttng-ust-dev" |
|||
|
|||
# CoreFX dependencies |
|||
__UbuntuPackages+=" libcurl4-openssl-dev" |
|||
__UbuntuPackages+=" libkrb5-dev" |
|||
__UbuntuPackages+=" libssl-dev" |
|||
__UbuntuPackages+=" zlib1g-dev" |
|||
|
|||
__AlpinePackages+=" curl-dev" |
|||
__AlpinePackages+=" krb5-dev" |
|||
__AlpinePackages+=" openssl-dev" |
|||
__AlpinePackages+=" zlib-dev" |
|||
|
|||
__UnprocessedBuildArgs= |
|||
while :; do |
|||
if [ $# -le 0 ]; then |
|||
break |
|||
fi |
|||
|
|||
lowerI="$(echo $1 | awk '{print tolower($0)}')" |
|||
case $lowerI in |
|||
-?|-h|--help) |
|||
usage |
|||
exit 1 |
|||
;; |
|||
arm) |
|||
__BuildArch=arm |
|||
__UbuntuArch=armhf |
|||
__AlpineArch=armhf |
|||
__QEMUArch=arm |
|||
;; |
|||
arm64) |
|||
__BuildArch=arm64 |
|||
__UbuntuArch=arm64 |
|||
__AlpineArch=aarch64 |
|||
__QEMUArch=aarch64 |
|||
;; |
|||
armel) |
|||
__BuildArch=armel |
|||
__UbuntuArch=armel |
|||
__UbuntuRepo="http://ftp.debian.org/debian/" |
|||
__LinuxCodeName=jessie |
|||
;; |
|||
x86) |
|||
__BuildArch=x86 |
|||
__UbuntuArch=i386 |
|||
__UbuntuRepo="http://archive.ubuntu.com/ubuntu/" |
|||
;; |
|||
lldb3.6) |
|||
__LLDB_Package="lldb-3.6-dev" |
|||
;; |
|||
lldb3.8) |
|||
__LLDB_Package="lldb-3.8-dev" |
|||
;; |
|||
lldb3.9) |
|||
__LLDB_Package="liblldb-3.9-dev" |
|||
;; |
|||
lldb4.0) |
|||
__LLDB_Package="liblldb-4.0-dev" |
|||
;; |
|||
lldb5.0) |
|||
__LLDB_Package="liblldb-5.0-dev" |
|||
;; |
|||
lldb6.0) |
|||
__LLDB_Package="liblldb-6.0-dev" |
|||
;; |
|||
no-lldb) |
|||
unset __LLDB_Package |
|||
;; |
|||
trusty) # Ubuntu 14.04 |
|||
if [ "$__LinuxCodeName" != "jessie" ]; then |
|||
__LinuxCodeName=trusty |
|||
fi |
|||
;; |
|||
xenial) # Ubuntu 16.04 |
|||
if [ "$__LinuxCodeName" != "jessie" ]; then |
|||
__LinuxCodeName=xenial |
|||
fi |
|||
;; |
|||
zesty) # Ubuntu 17.04 |
|||
if [ "$__LinuxCodeName" != "jessie" ]; then |
|||
__LinuxCodeName=zesty |
|||
fi |
|||
;; |
|||
bionic) # Ubuntu 18.04 |
|||
if [ "$__LinuxCodeName" != "jessie" ]; then |
|||
__LinuxCodeName=bionic |
|||
fi |
|||
;; |
|||
jessie) # Debian 8 |
|||
__LinuxCodeName=jessie |
|||
__UbuntuRepo="http://ftp.debian.org/debian/" |
|||
;; |
|||
stretch) # Debian 9 |
|||
__LinuxCodeName=stretch |
|||
__UbuntuRepo="http://ftp.debian.org/debian/" |
|||
__LLDB_Package="liblldb-6.0-dev" |
|||
;; |
|||
buster) # Debian 10 |
|||
__LinuxCodeName=buster |
|||
__UbuntuRepo="http://ftp.debian.org/debian/" |
|||
__LLDB_Package="liblldb-6.0-dev" |
|||
;; |
|||
tizen) |
|||
if [ "$__BuildArch" != "armel" ]; then |
|||
echo "Tizen is available only for armel." |
|||
usage; |
|||
exit 1; |
|||
fi |
|||
__LinuxCodeName= |
|||
__UbuntuRepo= |
|||
__Tizen=tizen |
|||
;; |
|||
alpine) |
|||
__LinuxCodeName=alpine |
|||
__UbuntuRepo= |
|||
;; |
|||
--skipunmount) |
|||
__SkipUnmount=1 |
|||
;; |
|||
--rootfsdir|-rootfsdir) |
|||
shift |
|||
__RootfsDir=$1 |
|||
;; |
|||
*) |
|||
__UnprocessedBuildArgs="$__UnprocessedBuildArgs $1" |
|||
;; |
|||
esac |
|||
|
|||
shift |
|||
done |
|||
|
|||
if [ "$__BuildArch" == "armel" ]; then |
|||
__LLDB_Package="lldb-3.5-dev" |
|||
fi |
|||
__UbuntuPackages+=" ${__LLDB_Package:-}" |
|||
|
|||
if [ -z "$__RootfsDir" ] && [ ! -z "$ROOTFS_DIR" ]; then |
|||
__RootfsDir=$ROOTFS_DIR |
|||
fi |
|||
|
|||
if [ -z "$__RootfsDir" ]; then |
|||
__RootfsDir="$__CrossDir/../../../.tools/rootfs/$__BuildArch" |
|||
fi |
|||
|
|||
if [ -d "$__RootfsDir" ]; then |
|||
if [ $__SkipUnmount == 0 ]; then |
|||
umount $__RootfsDir/* |
|||
fi |
|||
rm -rf $__RootfsDir |
|||
fi |
|||
|
|||
if [[ "$__LinuxCodeName" == "alpine" ]]; then |
|||
__ApkToolsVersion=2.9.1 |
|||
__AlpineVersion=3.7 |
|||
__ApkToolsDir=$(mktemp -d) |
|||
wget https://github.com/alpinelinux/apk-tools/releases/download/v$__ApkToolsVersion/apk-tools-$__ApkToolsVersion-x86_64-linux.tar.gz -P $__ApkToolsDir |
|||
tar -xf $__ApkToolsDir/apk-tools-$__ApkToolsVersion-x86_64-linux.tar.gz -C $__ApkToolsDir |
|||
mkdir -p $__RootfsDir/usr/bin |
|||
cp -v /usr/bin/qemu-$__QEMUArch-static $__RootfsDir/usr/bin |
|||
$__ApkToolsDir/apk-tools-$__ApkToolsVersion/apk \ |
|||
-X http://dl-cdn.alpinelinux.org/alpine/v$__AlpineVersion/main \ |
|||
-X http://dl-cdn.alpinelinux.org/alpine/v$__AlpineVersion/community \ |
|||
-X http://dl-cdn.alpinelinux.org/alpine/edge/testing \ |
|||
-X http://dl-cdn.alpinelinux.org/alpine/edge/main \ |
|||
-U --allow-untrusted --root $__RootfsDir --arch $__AlpineArch --initdb \ |
|||
add $__AlpinePackages |
|||
rm -r $__ApkToolsDir |
|||
elif [[ -n $__LinuxCodeName ]]; then |
|||
qemu-debootstrap --arch $__UbuntuArch $__LinuxCodeName $__RootfsDir $__UbuntuRepo |
|||
cp $__CrossDir/$__BuildArch/sources.list.$__LinuxCodeName $__RootfsDir/etc/apt/sources.list |
|||
chroot $__RootfsDir apt-get update |
|||
chroot $__RootfsDir apt-get -f -y install |
|||
chroot $__RootfsDir apt-get -y install $__UbuntuPackages |
|||
chroot $__RootfsDir symlinks -cr /usr |
|||
|
|||
if [ $__SkipUnmount == 0 ]; then |
|||
umount $__RootfsDir/* |
|||
fi |
|||
|
|||
if [[ "$__BuildArch" == "arm" && "$__LinuxCodeName" == "trusty" ]]; then |
|||
pushd $__RootfsDir |
|||
patch -p1 < $__CrossDir/$__BuildArch/trusty.patch |
|||
patch -p1 < $__CrossDir/$__BuildArch/trusty-lttng-2.4.patch |
|||
popd |
|||
fi |
|||
elif [ "$__Tizen" == "tizen" ]; then |
|||
ROOTFS_DIR=$__RootfsDir $__CrossDir/$__BuildArch/tizen-build-rootfs.sh |
|||
else |
|||
echo "Unsupported target platform." |
|||
usage; |
|||
exit 1 |
|||
fi |
|||
@ -0,0 +1,138 @@ |
|||
set(CROSS_ROOTFS $ENV{ROOTFS_DIR}) |
|||
|
|||
set(TARGET_ARCH_NAME $ENV{TARGET_BUILD_ARCH}) |
|||
set(CMAKE_SYSTEM_NAME Linux) |
|||
set(CMAKE_SYSTEM_VERSION 1) |
|||
|
|||
if(TARGET_ARCH_NAME STREQUAL "armel") |
|||
set(CMAKE_SYSTEM_PROCESSOR armv7l) |
|||
set(TOOLCHAIN "arm-linux-gnueabi") |
|||
if("$ENV{__DistroRid}" MATCHES "tizen.*") |
|||
set(TIZEN_TOOLCHAIN "armv7l-tizen-linux-gnueabi/6.2.1") |
|||
endif() |
|||
elseif(TARGET_ARCH_NAME STREQUAL "arm") |
|||
set(CMAKE_SYSTEM_PROCESSOR armv7l) |
|||
if(EXISTS ${CROSS_ROOTFS}/usr/lib/gcc/armv6-alpine-linux-musleabihf) |
|||
set(TOOLCHAIN "armv6-alpine-linux-musleabihf") |
|||
else() |
|||
set(TOOLCHAIN "arm-linux-gnueabihf") |
|||
endif() |
|||
elseif(TARGET_ARCH_NAME STREQUAL "arm64") |
|||
set(CMAKE_SYSTEM_PROCESSOR aarch64) |
|||
if(EXISTS ${CROSS_ROOTFS}/usr/lib/gcc/aarch64-alpine-linux-musl) |
|||
set(TOOLCHAIN "aarch64-alpine-linux-musl") |
|||
else() |
|||
set(TOOLCHAIN "aarch64-linux-gnu") |
|||
endif() |
|||
elseif(TARGET_ARCH_NAME STREQUAL "x86") |
|||
set(CMAKE_SYSTEM_PROCESSOR i686) |
|||
set(TOOLCHAIN "i686-linux-gnu") |
|||
else() |
|||
message(FATAL_ERROR "Arch is ${TARGET_ARCH_NAME}. Only armel, arm, arm64 and x86 are supported!") |
|||
endif() |
|||
|
|||
# Specify include paths |
|||
if(TARGET_ARCH_NAME STREQUAL "armel") |
|||
if(DEFINED TIZEN_TOOLCHAIN) |
|||
include_directories(SYSTEM ${CROSS_ROOTFS}/usr/lib/gcc/${TIZEN_TOOLCHAIN}/include/c++/) |
|||
include_directories(SYSTEM ${CROSS_ROOTFS}/usr/lib/gcc/${TIZEN_TOOLCHAIN}/include/c++/armv7l-tizen-linux-gnueabi) |
|||
endif() |
|||
endif() |
|||
|
|||
# add_compile_param - adds only new options without duplicates. |
|||
# arg0 - list with result options, arg1 - list with new options. |
|||
# arg2 - optional argument, quick summary string for optional using CACHE FORCE mode. |
|||
macro(add_compile_param) |
|||
if(NOT ${ARGC} MATCHES "^(2|3)$") |
|||
message(FATAL_ERROR "Wrong using add_compile_param! Two or three parameters must be given! See add_compile_param description.") |
|||
endif() |
|||
foreach(OPTION ${ARGV1}) |
|||
if(NOT ${ARGV0} MATCHES "${OPTION}($| )") |
|||
set(${ARGV0} "${${ARGV0}} ${OPTION}") |
|||
if(${ARGC} EQUAL "3") # CACHE FORCE mode |
|||
set(${ARGV0} "${${ARGV0}}" CACHE STRING "${ARGV2}" FORCE) |
|||
endif() |
|||
endif() |
|||
endforeach() |
|||
endmacro() |
|||
|
|||
# Specify link flags |
|||
add_compile_param(CROSS_LINK_FLAGS "--sysroot=${CROSS_ROOTFS}") |
|||
add_compile_param(CROSS_LINK_FLAGS "--gcc-toolchain=${CROSS_ROOTFS}/usr") |
|||
add_compile_param(CROSS_LINK_FLAGS "--target=${TOOLCHAIN}") |
|||
add_compile_param(CROSS_LINK_FLAGS "-fuse-ld=gold") |
|||
|
|||
if(TARGET_ARCH_NAME STREQUAL "armel") |
|||
if(DEFINED TIZEN_TOOLCHAIN) # For Tizen only |
|||
add_compile_param(CROSS_LINK_FLAGS "-B${CROSS_ROOTFS}/usr/lib/gcc/${TIZEN_TOOLCHAIN}") |
|||
add_compile_param(CROSS_LINK_FLAGS "-L${CROSS_ROOTFS}/lib") |
|||
add_compile_param(CROSS_LINK_FLAGS "-L${CROSS_ROOTFS}/usr/lib") |
|||
add_compile_param(CROSS_LINK_FLAGS "-L${CROSS_ROOTFS}/usr/lib/gcc/${TIZEN_TOOLCHAIN}") |
|||
endif() |
|||
elseif(TARGET_ARCH_NAME STREQUAL "x86") |
|||
add_compile_param(CROSS_LINK_FLAGS "-m32") |
|||
endif() |
|||
|
|||
add_compile_param(CMAKE_EXE_LINKER_FLAGS "${CROSS_LINK_FLAGS}" "TOOLCHAIN_EXE_LINKER_FLAGS") |
|||
add_compile_param(CMAKE_SHARED_LINKER_FLAGS "${CROSS_LINK_FLAGS}" "TOOLCHAIN_EXE_LINKER_FLAGS") |
|||
add_compile_param(CMAKE_MODULE_LINKER_FLAGS "${CROSS_LINK_FLAGS}" "TOOLCHAIN_EXE_LINKER_FLAGS") |
|||
|
|||
# Specify compile options |
|||
add_compile_options("--sysroot=${CROSS_ROOTFS}") |
|||
add_compile_options("--target=${TOOLCHAIN}") |
|||
add_compile_options("--gcc-toolchain=${CROSS_ROOTFS}/usr") |
|||
|
|||
if(TARGET_ARCH_NAME MATCHES "^(arm|armel|arm64)$") |
|||
set(CMAKE_C_COMPILER_TARGET ${TOOLCHAIN}) |
|||
set(CMAKE_CXX_COMPILER_TARGET ${TOOLCHAIN}) |
|||
set(CMAKE_ASM_COMPILER_TARGET ${TOOLCHAIN}) |
|||
endif() |
|||
|
|||
if(TARGET_ARCH_NAME MATCHES "^(arm|armel)$") |
|||
add_compile_options(-mthumb) |
|||
add_compile_options(-mfpu=vfpv3) |
|||
if(TARGET_ARCH_NAME STREQUAL "armel") |
|||
add_compile_options(-mfloat-abi=softfp) |
|||
if(DEFINED TIZEN_TOOLCHAIN) |
|||
add_compile_options(-Wno-deprecated-declarations) # compile-time option |
|||
add_compile_options(-D__extern_always_inline=inline) # compile-time option |
|||
endif() |
|||
endif() |
|||
elseif(TARGET_ARCH_NAME STREQUAL "x86") |
|||
add_compile_options(-m32) |
|||
add_compile_options(-Wno-error=unused-command-line-argument) |
|||
endif() |
|||
|
|||
# Set LLDB include and library paths |
|||
if(TARGET_ARCH_NAME MATCHES "^(arm|armel|x86)$") |
|||
if(TARGET_ARCH_NAME STREQUAL "x86") |
|||
set(LLVM_CROSS_DIR "$ENV{LLVM_CROSS_HOME}") |
|||
else() # arm/armel case |
|||
set(LLVM_CROSS_DIR "$ENV{LLVM_ARM_HOME}") |
|||
endif() |
|||
if(LLVM_CROSS_DIR) |
|||
set(WITH_LLDB_LIBS "${LLVM_CROSS_DIR}/lib/" CACHE STRING "") |
|||
set(WITH_LLDB_INCLUDES "${LLVM_CROSS_DIR}/include" CACHE STRING "") |
|||
set(LLDB_H "${WITH_LLDB_INCLUDES}" CACHE STRING "") |
|||
set(LLDB "${LLVM_CROSS_DIR}/lib/liblldb.so" CACHE STRING "") |
|||
else() |
|||
if(TARGET_ARCH_NAME STREQUAL "x86") |
|||
set(WITH_LLDB_LIBS "${CROSS_ROOTFS}/usr/lib/i386-linux-gnu" CACHE STRING "") |
|||
set(CHECK_LLVM_DIR "${CROSS_ROOTFS}/usr/lib/llvm-3.8/include") |
|||
if(EXISTS "${CHECK_LLVM_DIR}" AND IS_DIRECTORY "${CHECK_LLVM_DIR}") |
|||
set(WITH_LLDB_INCLUDES "${CHECK_LLVM_DIR}") |
|||
else() |
|||
set(WITH_LLDB_INCLUDES "${CROSS_ROOTFS}/usr/lib/llvm-3.6/include") |
|||
endif() |
|||
else() # arm/armel case |
|||
set(WITH_LLDB_LIBS "${CROSS_ROOTFS}/usr/lib/${TOOLCHAIN}" CACHE STRING "") |
|||
set(WITH_LLDB_INCLUDES "${CROSS_ROOTFS}/usr/lib/llvm-3.6/include" CACHE STRING "") |
|||
endif() |
|||
endif() |
|||
endif() |
|||
|
|||
set(CMAKE_FIND_ROOT_PATH "${CROSS_ROOTFS}") |
|||
set(CMAKE_FIND_ROOT_PATH_MODE_PROGRAM NEVER) |
|||
set(CMAKE_FIND_ROOT_PATH_MODE_LIBRARY ONLY) |
|||
set(CMAKE_FIND_ROOT_PATH_MODE_INCLUDE ONLY) |
|||
set(CMAKE_FIND_ROOT_PATH_MODE_PACKAGE ONLY) |
|||
@ -0,0 +1,11 @@ |
|||
deb http://archive.ubuntu.com/ubuntu/ bionic main restricted universe |
|||
deb-src http://archive.ubuntu.com/ubuntu/ bionic main restricted universe |
|||
|
|||
deb http://archive.ubuntu.com/ubuntu/ bionic-updates main restricted universe |
|||
deb-src http://archive.ubuntu.com/ubuntu/ bionic-updates main restricted universe |
|||
|
|||
deb http://archive.ubuntu.com/ubuntu/ bionic-backports main restricted |
|||
deb-src http://archive.ubuntu.com/ubuntu/ bionic-backports main restricted |
|||
|
|||
deb http://archive.ubuntu.com/ubuntu/ bionic-security main restricted universe multiverse |
|||
deb-src http://archive.ubuntu.com/ubuntu/ bionic-security main restricted universe multiverse |
|||
@ -0,0 +1,11 @@ |
|||
deb http://archive.ubuntu.com/ubuntu/ trusty main restricted universe |
|||
deb-src http://archive.ubuntu.com/ubuntu/ trusty main restricted universe |
|||
|
|||
deb http://archive.ubuntu.com/ubuntu/ trusty-updates main restricted universe |
|||
deb-src http://archive.ubuntu.com/ubuntu/ trusty-updates main restricted universe |
|||
|
|||
deb http://archive.ubuntu.com/ubuntu/ trusty-backports main restricted |
|||
deb-src http://archive.ubuntu.com/ubuntu/ trusty-backports main restricted |
|||
|
|||
deb http://archive.ubuntu.com/ubuntu/ trusty-security main restricted universe multiverse |
|||
deb-src http://archive.ubuntu.com/ubuntu/ trusty-security main restricted universe multiverse |
|||
@ -0,0 +1,11 @@ |
|||
deb http://archive.ubuntu.com/ubuntu/ xenial main restricted universe |
|||
deb-src http://archive.ubuntu.com/ubuntu/ xenial main restricted universe |
|||
|
|||
deb http://archive.ubuntu.com/ubuntu/ xenial-updates main restricted universe |
|||
deb-src http://archive.ubuntu.com/ubuntu/ xenial-updates main restricted universe |
|||
|
|||
deb http://archive.ubuntu.com/ubuntu/ xenial-backports main restricted |
|||
deb-src http://archive.ubuntu.com/ubuntu/ xenial-backports main restricted |
|||
|
|||
deb http://archive.ubuntu.com/ubuntu/ xenial-security main restricted universe multiverse |
|||
deb-src http://archive.ubuntu.com/ubuntu/ xenial-security main restricted universe multiverse |
|||
@ -0,0 +1,33 @@ |
|||
param ( |
|||
$darcVersion = $null, |
|||
$versionEndpoint = "https://maestro-prod.westus2.cloudapp.azure.com/api/assets/darc-version?api-version=2019-01-16" |
|||
) |
|||
|
|||
$verbosity = "m" |
|||
. $PSScriptRoot\tools.ps1 |
|||
|
|||
function InstallDarcCli ($darcVersion) { |
|||
$darcCliPackageName = "microsoft.dotnet.darc" |
|||
|
|||
$dotnetRoot = InitializeDotNetCli -install:$true |
|||
$dotnet = "$dotnetRoot\dotnet.exe" |
|||
$toolList = & "$dotnet" tool list -g |
|||
|
|||
if ($toolList -like "*$darcCliPackageName*") { |
|||
& "$dotnet" tool uninstall $darcCliPackageName -g |
|||
} |
|||
|
|||
# If the user didn't explicitly specify the darc version, |
|||
# query the Maestro API for the correct version of darc to install. |
|||
if (-not $darcVersion) { |
|||
$darcVersion = $(Invoke-WebRequest -Uri $versionEndpoint -UseBasicParsing).Content |
|||
} |
|||
|
|||
$arcadeServicesSource = 'https://dotnetfeed.blob.core.windows.net/dotnet-core/index.json' |
|||
|
|||
Write-Host "Installing Darc CLI version $darcVersion..." |
|||
Write-Host "You may need to restart your command window if this is the first dotnet tool you have installed." |
|||
& "$dotnet" tool install $darcCliPackageName --version $darcVersion --add-source "$arcadeServicesSource" -v $verbosity -g |
|||
} |
|||
|
|||
InstallDarcCli $darcVersion |
|||
@ -0,0 +1,64 @@ |
|||
#!/usr/bin/env bash |
|||
|
|||
source="${BASH_SOURCE[0]}" |
|||
darcVersion='' |
|||
versionEndpoint="https://maestro-prod.westus2.cloudapp.azure.com/api/assets/darc-version?api-version=2019-01-16" |
|||
|
|||
while [[ $# > 0 ]]; do |
|||
opt="$(echo "$1" | awk '{print tolower($0)}')" |
|||
case "$opt" in |
|||
--darcversion) |
|||
darcVersion=$2 |
|||
shift |
|||
;; |
|||
--versionendpoint) |
|||
versionEndpoint=$2 |
|||
shift |
|||
;; |
|||
*) |
|||
echo "Invalid argument: $1" |
|||
usage |
|||
exit 1 |
|||
;; |
|||
esac |
|||
|
|||
shift |
|||
done |
|||
|
|||
# resolve $source until the file is no longer a symlink |
|||
while [[ -h "$source" ]]; do |
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
source="$(readlink "$source")" |
|||
# if $source was a relative symlink, we need to resolve it relative to the path where the |
|||
# symlink file was located |
|||
[[ $source != /* ]] && source="$scriptroot/$source" |
|||
done |
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
verbosity=m |
|||
|
|||
. "$scriptroot/tools.sh" |
|||
|
|||
if [ -z "$darcVersion" ]; then |
|||
darcVersion=$(curl -X GET "$versionEndpoint" -H "accept: text/plain") |
|||
fi |
|||
|
|||
function InstallDarcCli { |
|||
local darc_cli_package_name="microsoft.dotnet.darc" |
|||
|
|||
InitializeDotNetCli |
|||
local dotnet_root=$_InitializeDotNetCli |
|||
|
|||
local uninstall_command=`$dotnet_root/dotnet tool uninstall $darc_cli_package_name -g` |
|||
local tool_list=$($dotnet_root/dotnet tool list -g) |
|||
if [[ $tool_list = *$darc_cli_package_name* ]]; then |
|||
echo $($dotnet_root/dotnet tool uninstall $darc_cli_package_name -g) |
|||
fi |
|||
|
|||
local arcadeServicesSource="https://dotnetfeed.blob.core.windows.net/dotnet-core/index.json" |
|||
|
|||
echo "Installing Darc CLI version $darcVersion..." |
|||
echo "You may need to restart your command shell if this is the first dotnet tool you have installed." |
|||
echo $($dotnet_root/dotnet tool install $darc_cli_package_name --version $darcVersion --add-source "$arcadeServicesSource" -v $verbosity -g) |
|||
} |
|||
|
|||
InstallDarcCli |
|||
@ -0,0 +1,2 @@ |
|||
@echo off |
|||
powershell -ExecutionPolicy ByPass -NoProfile -command "& """%~dp0dotnet-install.ps1""" %*" |
|||
@ -0,0 +1,27 @@ |
|||
[CmdletBinding(PositionalBinding=$false)] |
|||
Param( |
|||
[string] $verbosity = "minimal", |
|||
[string] $architecture = "", |
|||
[string] $version = "Latest", |
|||
[string] $runtime = "dotnet" |
|||
) |
|||
|
|||
. $PSScriptRoot\tools.ps1 |
|||
|
|||
$dotnetRoot = Join-Path $RepoRoot ".dotnet" |
|||
|
|||
$installdir = $dotnetRoot |
|||
try { |
|||
if ($architecture -and $architecture.Trim() -eq "x86") { |
|||
$installdir = Join-Path $installdir "x86" |
|||
} |
|||
InstallDotNet $installdir $version $architecture $runtime $true |
|||
} |
|||
catch { |
|||
Write-Host $_ |
|||
Write-Host $_.Exception |
|||
Write-Host $_.ScriptStackTrace |
|||
ExitWithExitCode 1 |
|||
} |
|||
|
|||
ExitWithExitCode 0 |
|||
@ -0,0 +1,49 @@ |
|||
#!/usr/bin/env bash |
|||
|
|||
source="${BASH_SOURCE[0]}" |
|||
# resolve $source until the file is no longer a symlink |
|||
while [[ -h "$source" ]]; do |
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
source="$(readlink "$source")" |
|||
# if $source was a relative symlink, we need to resolve it relative to the path where the |
|||
# symlink file was located |
|||
[[ $source != /* ]] && source="$scriptroot/$source" |
|||
done |
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
|
|||
version='Latest' |
|||
architecture='' |
|||
runtime='dotnet' |
|||
while [[ $# > 0 ]]; do |
|||
opt="$(echo "$1" | awk '{print tolower($0)}')" |
|||
case "$opt" in |
|||
-version|-v) |
|||
shift |
|||
version="$1" |
|||
;; |
|||
-architecture|-a) |
|||
shift |
|||
architecture="$1" |
|||
;; |
|||
-runtime|-r) |
|||
shift |
|||
runtime="$1" |
|||
;; |
|||
*) |
|||
echo "Invalid argument: $1" |
|||
usage |
|||
exit 1 |
|||
;; |
|||
esac |
|||
shift |
|||
done |
|||
|
|||
. "$scriptroot/tools.sh" |
|||
dotnetRoot="$repo_root/.dotnet" |
|||
InstallDotNet $dotnetRoot $version "$architecture" $runtime true || { |
|||
local exit_code=$? |
|||
echo "dotnet-install.sh failed (exit code '$exit_code')." >&2 |
|||
ExitWithExitCode $exit_code |
|||
} |
|||
|
|||
ExitWithExitCode 0 |
|||
@ -0,0 +1,87 @@ |
|||
Param( |
|||
[Parameter(Mandatory=$true)][string] $barToken, # Token generated at https://maestro-prod.westus2.cloudapp.azure.com/Account/Tokens |
|||
[Parameter(Mandatory=$true)][string] $gitHubPat, # GitHub personal access token from https://github.com/settings/tokens (no auth scopes needed) |
|||
[Parameter(Mandatory=$true)][string] $azdoPat, # Azure Dev Ops tokens from https://dev.azure.com/dnceng/_details/security/tokens (code read scope needed) |
|||
[Parameter(Mandatory=$true)][string] $outputFolder, # Where the graphviz.txt file will be created |
|||
[string] $darcVersion = '1.1.0-beta.19175.6', # darc's version |
|||
[string] $graphvizVersion = '2.38', # GraphViz version |
|||
[switch] $includeToolset # Whether the graph should include toolset dependencies or not. i.e. arcade, optimization. For more about |
|||
# toolset dependencies see https://github.com/dotnet/arcade/blob/master/Documentation/Darc.md#toolset-vs-product-dependencies |
|||
) |
|||
|
|||
$ErrorActionPreference = "Stop" |
|||
. $PSScriptRoot\tools.ps1 |
|||
|
|||
Import-Module -Name (Join-Path $PSScriptRoot "native\CommonLibrary.psm1") |
|||
|
|||
function CheckExitCode ([string]$stage) |
|||
{ |
|||
$exitCode = $LASTEXITCODE |
|||
if ($exitCode -ne 0) { |
|||
Write-Host "Something failed in stage: '$stage'. Check for errors above. Exiting now..." |
|||
ExitWithExitCode $exitCode |
|||
} |
|||
} |
|||
|
|||
try { |
|||
Push-Location $PSScriptRoot |
|||
|
|||
Write-Host "Installing darc..." |
|||
. .\darc-init.ps1 -darcVersion $darcVersion |
|||
CheckExitCode "Running darc-init" |
|||
|
|||
$engCommonBaseDir = Join-Path $PSScriptRoot "native\" |
|||
$graphvizInstallDir = CommonLibrary\Get-NativeInstallDirectory |
|||
$nativeToolBaseUri = "https://netcorenativeassets.blob.core.windows.net/resource-packages/external" |
|||
$installBin = Join-Path $graphvizInstallDir "bin" |
|||
|
|||
Write-Host "Installing dot..." |
|||
.\native\install-tool.ps1 -ToolName graphviz -InstallPath $installBin -BaseUri $nativeToolBaseUri -CommonLibraryDirectory $engCommonBaseDir -Version $graphvizVersion -Verbose |
|||
|
|||
$darcExe = "$env:USERPROFILE\.dotnet\tools" |
|||
$darcExe = Resolve-Path "$darcExe\darc.exe" |
|||
|
|||
Create-Directory $outputFolder |
|||
|
|||
# Generate 3 graph descriptions: |
|||
# 1. Flat with coherency information |
|||
# 2. Graphviz (dot) file |
|||
# 3. Standard dependency graph |
|||
$graphVizFilePath = "$outputFolder\graphviz.txt" |
|||
$graphVizImageFilePath = "$outputFolder\graph.png" |
|||
$normalGraphFilePath = "$outputFolder\graph-full.txt" |
|||
$flatGraphFilePath = "$outputFolder\graph-flat.txt" |
|||
$baseOptions = @( "--github-pat", "$gitHubPat", "--azdev-pat", "$azdoPat", "--password", "$barToken" ) |
|||
|
|||
if ($includeToolset) { |
|||
Write-Host "Toolsets will be included in the graph..." |
|||
$baseOptions += @( "--include-toolset" ) |
|||
} |
|||
|
|||
Write-Host "Generating standard dependency graph..." |
|||
& "$darcExe" get-dependency-graph @baseOptions --output-file $normalGraphFilePath |
|||
CheckExitCode "Generating normal dependency graph" |
|||
|
|||
Write-Host "Generating flat dependency graph and graphviz file..." |
|||
& "$darcExe" get-dependency-graph @baseOptions --flat --coherency --graphviz $graphVizFilePath --output-file $flatGraphFilePath |
|||
CheckExitCode "Generating flat and graphviz dependency graph" |
|||
|
|||
Write-Host "Generating graph image $graphVizFilePath" |
|||
$dotFilePath = Join-Path $installBin "graphviz\$graphvizVersion\release\bin\dot.exe" |
|||
& "$dotFilePath" -Tpng -o"$graphVizImageFilePath" "$graphVizFilePath" |
|||
CheckExitCode "Generating graphviz image" |
|||
|
|||
Write-Host "'$graphVizFilePath', '$flatGraphFilePath', '$normalGraphFilePath' and '$graphVizImageFilePath' created!" |
|||
} |
|||
catch { |
|||
if (!$includeToolset) { |
|||
Write-Host "This might be a toolset repo which includes only toolset dependencies. " -NoNewline -ForegroundColor Yellow |
|||
Write-Host "Since -includeToolset is not set there is no graph to create. Include -includeToolset and try again..." -ForegroundColor Yellow |
|||
} |
|||
Write-Host $_ |
|||
Write-Host $_.Exception |
|||
Write-Host $_.ScriptStackTrace |
|||
ExitWithExitCode 1 |
|||
} finally { |
|||
Pop-Location |
|||
} |
|||
@ -0,0 +1,26 @@ |
|||
<Project Sdk="Microsoft.DotNet.Helix.Sdk" DefaultTargets="Test"> |
|||
|
|||
<PropertyGroup> |
|||
<Language>msbuild</Language> |
|||
</PropertyGroup> |
|||
|
|||
<ItemGroup> |
|||
<HelixCorrelationPayload Include="$(CorrelationPayloadDirectory)"> |
|||
<PayloadDirectory>%(Identity)</PayloadDirectory> |
|||
</HelixCorrelationPayload> |
|||
</ItemGroup> |
|||
|
|||
<ItemGroup> |
|||
<HelixWorkItem Include="WorkItem" Condition="'$(WorkItemDirectory)' != ''"> |
|||
<PayloadDirectory>$(WorkItemDirectory)</PayloadDirectory> |
|||
<Command>$(WorkItemCommand)</Command> |
|||
<Timeout Condition="'$(WorkItemTimeout)' != ''">$(WorkItemTimeout)</Timeout> |
|||
</HelixWorkItem> |
|||
</ItemGroup> |
|||
|
|||
<ItemGroup> |
|||
<XUnitProject Include="$(XUnitProjects.Split(';'))"> |
|||
<Arguments /> |
|||
</XUnitProject> |
|||
</ItemGroup> |
|||
</Project> |
|||
@ -0,0 +1,3 @@ |
|||
@echo off |
|||
powershell -NoProfile -NoLogo -ExecutionPolicy ByPass -command "& """%~dp0init-tools-native.ps1""" %*" |
|||
exit /b %ErrorLevel% |
|||
@ -0,0 +1,147 @@ |
|||
<# |
|||
.SYNOPSIS |
|||
Entry point script for installing native tools |
|||
|
|||
.DESCRIPTION |
|||
Reads $RepoRoot\global.json file to determine native assets to install |
|||
and executes installers for those tools |
|||
|
|||
.PARAMETER BaseUri |
|||
Base file directory or Url from which to acquire tool archives |
|||
|
|||
.PARAMETER InstallDirectory |
|||
Directory to install native toolset. This is a command-line override for the default |
|||
Install directory precedence order: |
|||
- InstallDirectory command-line override |
|||
- NETCOREENG_INSTALL_DIRECTORY environment variable |
|||
- (default) %USERPROFILE%/.netcoreeng/native |
|||
|
|||
.PARAMETER Clean |
|||
Switch specifying to not install anything, but cleanup native asset folders |
|||
|
|||
.PARAMETER Force |
|||
Clean and then install tools |
|||
|
|||
.PARAMETER DownloadRetries |
|||
Total number of retry attempts |
|||
|
|||
.PARAMETER RetryWaitTimeInSeconds |
|||
Wait time between retry attempts in seconds |
|||
|
|||
.PARAMETER GlobalJsonFile |
|||
File path to global.json file |
|||
|
|||
.NOTES |
|||
#> |
|||
[CmdletBinding(PositionalBinding=$false)] |
|||
Param ( |
|||
[string] $BaseUri = "https://netcorenativeassets.blob.core.windows.net/resource-packages/external", |
|||
[string] $InstallDirectory, |
|||
[switch] $Clean = $False, |
|||
[switch] $Force = $False, |
|||
[int] $DownloadRetries = 5, |
|||
[int] $RetryWaitTimeInSeconds = 30, |
|||
[string] $GlobalJsonFile |
|||
) |
|||
|
|||
if (!$GlobalJsonFile) { |
|||
$GlobalJsonFile = Join-Path (Get-Item $PSScriptRoot).Parent.Parent.FullName "global.json" |
|||
} |
|||
|
|||
Set-StrictMode -version 2.0 |
|||
$ErrorActionPreference="Stop" |
|||
|
|||
Import-Module -Name (Join-Path $PSScriptRoot "native\CommonLibrary.psm1") |
|||
|
|||
try { |
|||
# Define verbose switch if undefined |
|||
$Verbose = $VerbosePreference -Eq "Continue" |
|||
|
|||
$EngCommonBaseDir = Join-Path $PSScriptRoot "native\" |
|||
$NativeBaseDir = $InstallDirectory |
|||
if (!$NativeBaseDir) { |
|||
$NativeBaseDir = CommonLibrary\Get-NativeInstallDirectory |
|||
} |
|||
$Env:CommonLibrary_NativeInstallDir = $NativeBaseDir |
|||
$InstallBin = Join-Path $NativeBaseDir "bin" |
|||
$InstallerPath = Join-Path $EngCommonBaseDir "install-tool.ps1" |
|||
|
|||
# Process tools list |
|||
Write-Host "Processing $GlobalJsonFile" |
|||
If (-Not (Test-Path $GlobalJsonFile)) { |
|||
Write-Host "Unable to find '$GlobalJsonFile'" |
|||
exit 0 |
|||
} |
|||
$NativeTools = Get-Content($GlobalJsonFile) -Raw | |
|||
ConvertFrom-Json | |
|||
Select-Object -Expand "native-tools" -ErrorAction SilentlyContinue |
|||
if ($NativeTools) { |
|||
$NativeTools.PSObject.Properties | ForEach-Object { |
|||
$ToolName = $_.Name |
|||
$ToolVersion = $_.Value |
|||
$LocalInstallerArguments = @{ ToolName = "$ToolName" } |
|||
$LocalInstallerArguments += @{ InstallPath = "$InstallBin" } |
|||
$LocalInstallerArguments += @{ BaseUri = "$BaseUri" } |
|||
$LocalInstallerArguments += @{ CommonLibraryDirectory = "$EngCommonBaseDir" } |
|||
$LocalInstallerArguments += @{ Version = "$ToolVersion" } |
|||
|
|||
if ($Verbose) { |
|||
$LocalInstallerArguments += @{ Verbose = $True } |
|||
} |
|||
if (Get-Variable 'Force' -ErrorAction 'SilentlyContinue') { |
|||
if($Force) { |
|||
$LocalInstallerArguments += @{ Force = $True } |
|||
} |
|||
} |
|||
if ($Clean) { |
|||
$LocalInstallerArguments += @{ Clean = $True } |
|||
} |
|||
|
|||
Write-Verbose "Installing $ToolName version $ToolVersion" |
|||
Write-Verbose "Executing '$InstallerPath $($LocalInstallerArguments.Keys.ForEach({"-$_ '$($LocalInstallerArguments.$_)'"}) -join ' ')'" |
|||
& $InstallerPath @LocalInstallerArguments |
|||
if ($LASTEXITCODE -Ne "0") { |
|||
$errMsg = "$ToolName installation failed" |
|||
if ((Get-Variable 'DoNotAbortNativeToolsInstallationOnFailure' -ErrorAction 'SilentlyContinue') -and $DoNotAbortNativeToolsInstallationOnFailure) { |
|||
$showNativeToolsWarning = $true |
|||
if ((Get-Variable 'DoNotDisplayNativeToolsInstallationWarnings' -ErrorAction 'SilentlyContinue') -and $DoNotDisplayNativeToolsInstallationWarnings) { |
|||
$showNativeToolsWarning = $false |
|||
} |
|||
if ($showNativeToolsWarning) { |
|||
Write-Warning $errMsg |
|||
} |
|||
$toolInstallationFailure = $true |
|||
} else { |
|||
Write-Error $errMsg |
|||
exit 1 |
|||
} |
|||
} |
|||
} |
|||
|
|||
if ((Get-Variable 'toolInstallationFailure' -ErrorAction 'SilentlyContinue') -and $toolInstallationFailure) { |
|||
exit 1 |
|||
} |
|||
} |
|||
else { |
|||
Write-Host "No native tools defined in global.json" |
|||
exit 0 |
|||
} |
|||
|
|||
if ($Clean) { |
|||
exit 0 |
|||
} |
|||
if (Test-Path $InstallBin) { |
|||
Write-Host "Native tools are available from" (Convert-Path -Path $InstallBin) |
|||
Write-Host "##vso[task.prependpath]$(Convert-Path -Path $InstallBin)" |
|||
} |
|||
else { |
|||
Write-Error "Native tools install directory does not exist, installation failed" |
|||
exit 1 |
|||
} |
|||
exit 0 |
|||
} |
|||
catch { |
|||
Write-Host $_ |
|||
Write-Host $_.Exception |
|||
exit 1 |
|||
} |
|||
@ -0,0 +1,141 @@ |
|||
#!/usr/bin/env bash |
|||
|
|||
source="${BASH_SOURCE[0]}" |
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
|
|||
base_uri='https://netcorenativeassets.blob.core.windows.net/resource-packages/external' |
|||
install_directory='' |
|||
clean=false |
|||
force=false |
|||
download_retries=5 |
|||
retry_wait_time_seconds=30 |
|||
global_json_file="$(dirname "$(dirname "${scriptroot}")")/global.json" |
|||
declare -A native_assets |
|||
|
|||
. $scriptroot/native/common-library.sh |
|||
|
|||
while (($# > 0)); do |
|||
lowerI="$(echo $1 | awk '{print tolower($0)}')" |
|||
case $lowerI in |
|||
--baseuri) |
|||
base_uri=$2 |
|||
shift 2 |
|||
;; |
|||
--installdirectory) |
|||
install_directory=$2 |
|||
shift 2 |
|||
;; |
|||
--clean) |
|||
clean=true |
|||
shift 1 |
|||
;; |
|||
--force) |
|||
force=true |
|||
shift 1 |
|||
;; |
|||
--downloadretries) |
|||
download_retries=$2 |
|||
shift 2 |
|||
;; |
|||
--retrywaittimeseconds) |
|||
retry_wait_time_seconds=$2 |
|||
shift 2 |
|||
;; |
|||
--help) |
|||
echo "Common settings:" |
|||
echo " --installdirectory Directory to install native toolset." |
|||
echo " This is a command-line override for the default" |
|||
echo " Install directory precedence order:" |
|||
echo " - InstallDirectory command-line override" |
|||
echo " - NETCOREENG_INSTALL_DIRECTORY environment variable" |
|||
echo " - (default) %USERPROFILE%/.netcoreeng/native" |
|||
echo "" |
|||
echo " --clean Switch specifying not to install anything, but cleanup native asset folders" |
|||
echo " --force Clean and then install tools" |
|||
echo " --help Print help and exit" |
|||
echo "" |
|||
echo "Advanced settings:" |
|||
echo " --baseuri <value> Base URI for where to download native tools from" |
|||
echo " --downloadretries <value> Number of times a download should be attempted" |
|||
echo " --retrywaittimeseconds <value> Wait time between download attempts" |
|||
echo "" |
|||
exit 0 |
|||
;; |
|||
esac |
|||
done |
|||
|
|||
function ReadGlobalJsonNativeTools { |
|||
# Get the native-tools section from the global.json. |
|||
local native_tools_section=$(cat $global_json_file | awk '/"native-tools"/,/}/') |
|||
# Only extract the contents of the object. |
|||
local native_tools_list=$(echo $native_tools_section | awk -F"[{}]" '{print $2}') |
|||
native_tools_list=${native_tools_list//[\" ]/} |
|||
native_tools_list=$( echo "$native_tools_list" | sed 's/\s//g' | sed 's/,/\n/g' ) |
|||
|
|||
local old_IFS=$IFS |
|||
while read -r line; do |
|||
# Lines are of the form: 'tool:version' |
|||
IFS=: |
|||
while read -r key value; do |
|||
native_assets[$key]=$value |
|||
done <<< "$line" |
|||
done <<< "$native_tools_list" |
|||
IFS=$old_IFS |
|||
|
|||
return 0; |
|||
} |
|||
|
|||
native_base_dir=$install_directory |
|||
if [[ -z $install_directory ]]; then |
|||
native_base_dir=$(GetNativeInstallDirectory) |
|||
fi |
|||
|
|||
install_bin="${native_base_dir}/bin" |
|||
|
|||
ReadGlobalJsonNativeTools |
|||
|
|||
if [[ ${#native_assets[@]} -eq 0 ]]; then |
|||
echo "No native tools defined in global.json" |
|||
exit 0; |
|||
else |
|||
native_installer_dir="$scriptroot/native" |
|||
for tool in "${!native_assets[@]}" |
|||
do |
|||
tool_version=${native_assets[$tool]} |
|||
installer_name="install-$tool.sh" |
|||
installer_command="$native_installer_dir/$installer_name" |
|||
installer_command+=" --baseuri $base_uri" |
|||
installer_command+=" --installpath $install_bin" |
|||
installer_command+=" --version $tool_version" |
|||
echo $installer_command |
|||
|
|||
if [[ $force = true ]]; then |
|||
installer_command+=" --force" |
|||
fi |
|||
|
|||
if [[ $clean = true ]]; then |
|||
installer_command+=" --clean" |
|||
fi |
|||
|
|||
$installer_command |
|||
|
|||
if [[ $? != 0 ]]; then |
|||
echo "Execution Failed" >&2 |
|||
exit 1 |
|||
fi |
|||
done |
|||
fi |
|||
|
|||
if [[ $clean = true ]]; then |
|||
exit 0 |
|||
fi |
|||
|
|||
if [[ -d $install_bin ]]; then |
|||
echo "Native tools are available from $install_bin" |
|||
echo "##vso[task.prependpath]$install_bin" |
|||
else |
|||
echo "Native tools install directory does not exist, installation failed" >&2 |
|||
exit 1 |
|||
fi |
|||
|
|||
exit 0 |
|||
@ -0,0 +1,135 @@ |
|||
param( |
|||
[Parameter(Mandatory=$true)][string] $Operation, |
|||
[string] $AuthToken, |
|||
[string] $CommitSha, |
|||
[string] $RepoName, |
|||
[switch] $IsFeedPrivate |
|||
) |
|||
|
|||
$ErrorActionPreference = "Stop" |
|||
Set-StrictMode -Version 2.0 |
|||
|
|||
. $PSScriptRoot\tools.ps1 |
|||
|
|||
# Sets VSS_NUGET_EXTERNAL_FEED_ENDPOINTS based on the "darc-int-*" feeds defined in NuGet.config. This is needed |
|||
# in build agents by CredProvider to authenticate the restore requests to internal feeds as specified in |
|||
# https://github.com/microsoft/artifacts-credprovider/blob/0f53327cd12fd893d8627d7b08a2171bf5852a41/README.md#environment-variables. This should ONLY be called from identified |
|||
# internal builds |
|||
function SetupCredProvider { |
|||
param( |
|||
[string] $AuthToken |
|||
) |
|||
|
|||
# Install the Cred Provider NuGet plugin |
|||
Write-Host "Setting up Cred Provider NuGet plugin in the agent..." |
|||
Write-Host "Getting 'installcredprovider.ps1' from 'https://github.com/microsoft/artifacts-credprovider'..." |
|||
|
|||
$url = 'https://raw.githubusercontent.com/microsoft/artifacts-credprovider/master/helpers/installcredprovider.ps1' |
|||
|
|||
Write-Host "Writing the contents of 'installcredprovider.ps1' locally..." |
|||
Invoke-WebRequest $url -OutFile installcredprovider.ps1 |
|||
|
|||
Write-Host "Installing plugin..." |
|||
.\installcredprovider.ps1 -Force |
|||
|
|||
Write-Host "Deleting local copy of 'installcredprovider.ps1'..." |
|||
Remove-Item .\installcredprovider.ps1 |
|||
|
|||
if (-Not("$env:USERPROFILE\.nuget\plugins\netcore")) { |
|||
Write-Host "CredProvider plugin was not installed correctly!" |
|||
ExitWithExitCode 1 |
|||
} |
|||
else { |
|||
Write-Host "CredProvider plugin was installed correctly!" |
|||
} |
|||
|
|||
# Then, we set the 'VSS_NUGET_EXTERNAL_FEED_ENDPOINTS' environment variable to restore from the stable |
|||
# feeds successfully |
|||
|
|||
$nugetConfigPath = "$RepoRoot\NuGet.config" |
|||
|
|||
if (-Not (Test-Path -Path $nugetConfigPath)) { |
|||
Write-Host "NuGet.config file not found in repo's root!" |
|||
ExitWithExitCode 1 |
|||
} |
|||
|
|||
$endpoints = New-Object System.Collections.ArrayList |
|||
$nugetConfigPackageSources = Select-Xml -Path $nugetConfigPath -XPath "//packageSources/add[contains(@key, 'darc-int-')]/@value" | foreach{$_.Node.Value} |
|||
|
|||
if (($nugetConfigPackageSources | Measure-Object).Count -gt 0 ) { |
|||
foreach ($stableRestoreResource in $nugetConfigPackageSources) { |
|||
$trimmedResource = ([string]$stableRestoreResource).Trim() |
|||
[void]$endpoints.Add(@{endpoint="$trimmedResource"; password="$AuthToken"}) |
|||
} |
|||
} |
|||
|
|||
if (($endpoints | Measure-Object).Count -gt 0) { |
|||
# Create the JSON object. It should look like '{"endpointCredentials": [{"endpoint":"http://example.index.json", "username":"optional", "password":"accesstoken"}]}' |
|||
$endpointCredentials = @{endpointCredentials=$endpoints} | ConvertTo-Json -Compress |
|||
|
|||
# Create the environment variables the AzDo way |
|||
Write-LoggingCommand -Area 'task' -Event 'setvariable' -Data $endpointCredentials -Properties @{ |
|||
'variable' = 'VSS_NUGET_EXTERNAL_FEED_ENDPOINTS' |
|||
'issecret' = 'false' |
|||
} |
|||
|
|||
# We don't want sessions cached since we will be updating the endpoints quite frequently |
|||
Write-LoggingCommand -Area 'task' -Event 'setvariable' -Data 'False' -Properties @{ |
|||
'variable' = 'NUGET_CREDENTIALPROVIDER_SESSIONTOKENCACHE_ENABLED' |
|||
'issecret' = 'false' |
|||
} |
|||
} |
|||
else |
|||
{ |
|||
Write-Host "No internal endpoints found in NuGet.config" |
|||
} |
|||
} |
|||
|
|||
#Workaround for https://github.com/microsoft/msbuild/issues/4430 |
|||
function InstallDotNetSdkAndRestoreArcade { |
|||
$dotnetTempDir = "$RepoRoot\dotnet" |
|||
$dotnetSdkVersion="2.1.507" # After experimentation we know this version works when restoring the SDK (compared to 3.0.*) |
|||
$dotnet = "$dotnetTempDir\dotnet.exe" |
|||
$restoreProjPath = "$PSScriptRoot\restore.proj" |
|||
|
|||
Write-Host "Installing dotnet SDK version $dotnetSdkVersion to restore Arcade SDK..." |
|||
InstallDotNetSdk "$dotnetTempDir" "$dotnetSdkVersion" |
|||
|
|||
'<Project Sdk="Microsoft.DotNet.Arcade.Sdk"/>' | Out-File "$restoreProjPath" |
|||
|
|||
& $dotnet restore $restoreProjPath |
|||
|
|||
Write-Host "Arcade SDK restored!" |
|||
|
|||
if (Test-Path -Path $restoreProjPath) { |
|||
Remove-Item $restoreProjPath |
|||
} |
|||
|
|||
if (Test-Path -Path $dotnetTempDir) { |
|||
Remove-Item $dotnetTempDir -Recurse |
|||
} |
|||
} |
|||
|
|||
try { |
|||
Push-Location $PSScriptRoot |
|||
|
|||
if ($Operation -like "setup") { |
|||
SetupCredProvider $AuthToken |
|||
} |
|||
elseif ($Operation -like "install-restore") { |
|||
InstallDotNetSdkAndRestoreArcade |
|||
} |
|||
else { |
|||
Write-Host "Unknown operation '$Operation'!" |
|||
ExitWithExitCode 1 |
|||
} |
|||
} |
|||
catch { |
|||
Write-Host $_ |
|||
Write-Host $_.Exception |
|||
Write-Host $_.ScriptStackTrace |
|||
ExitWithExitCode 1 |
|||
} |
|||
finally { |
|||
Pop-Location |
|||
} |
|||
@ -0,0 +1,142 @@ |
|||
#!/usr/bin/env bash |
|||
|
|||
set -e |
|||
|
|||
# Sets VSS_NUGET_EXTERNAL_FEED_ENDPOINTS based on the "darc-int-*" feeds defined in NuGet.config. This is needed |
|||
# in build agents by CredProvider to authenticate the restore requests to internal feeds as specified in |
|||
# https://github.com/microsoft/artifacts-credprovider/blob/0f53327cd12fd893d8627d7b08a2171bf5852a41/README.md#environment-variables. |
|||
# This should ONLY be called from identified internal builds |
|||
function SetupCredProvider { |
|||
local authToken=$1 |
|||
|
|||
# Install the Cred Provider NuGet plugin |
|||
echo "Setting up Cred Provider NuGet plugin in the agent..."... |
|||
echo "Getting 'installcredprovider.ps1' from 'https://github.com/microsoft/artifacts-credprovider'..." |
|||
|
|||
local url="https://raw.githubusercontent.com/microsoft/artifacts-credprovider/master/helpers/installcredprovider.sh" |
|||
|
|||
echo "Writing the contents of 'installcredprovider.ps1' locally..." |
|||
local installcredproviderPath="installcredprovider.sh" |
|||
if command -v curl > /dev/null; then |
|||
curl $url > "$installcredproviderPath" |
|||
else |
|||
wget -q -O "$installcredproviderPath" "$url" |
|||
fi |
|||
|
|||
echo "Installing plugin..." |
|||
. "$installcredproviderPath" |
|||
|
|||
echo "Deleting local copy of 'installcredprovider.sh'..." |
|||
rm installcredprovider.sh |
|||
|
|||
if [ ! -d "$HOME/.nuget/plugins" ]; then |
|||
echo "CredProvider plugin was not installed correctly!" |
|||
ExitWithExitCode 1 |
|||
else |
|||
echo "CredProvider plugin was installed correctly!" |
|||
fi |
|||
|
|||
# Then, we set the 'VSS_NUGET_EXTERNAL_FEED_ENDPOINTS' environment variable to restore from the stable |
|||
# feeds successfully |
|||
|
|||
local nugetConfigPath="$repo_root/NuGet.config" |
|||
|
|||
if [ ! "$nugetConfigPath" ]; then |
|||
echo "NuGet.config file not found in repo's root!" |
|||
ExitWithExitCode 1 |
|||
fi |
|||
|
|||
local endpoints='[' |
|||
local nugetConfigPackageValues=`cat "$nugetConfigPath" | grep "key=\"darc-int-"` |
|||
local pattern="value=\"(.*)\"" |
|||
|
|||
for value in $nugetConfigPackageValues |
|||
do |
|||
if [[ $value =~ $pattern ]]; then |
|||
local endpoint="${BASH_REMATCH[1]}" |
|||
endpoints+="{\"endpoint\": \"$endpoint\", \"password\": \"$authToken\"}," |
|||
fi |
|||
done |
|||
|
|||
endpoints=${endpoints%?} |
|||
endpoints+=']' |
|||
|
|||
if [ ${#endpoints} -gt 2 ]; then |
|||
# Create the JSON object. It should look like '{"endpointCredentials": [{"endpoint":"http://example.index.json", "username":"optional", "password":"accesstoken"}]}' |
|||
local endpointCredentials="{\"endpointCredentials\": "$endpoints"}" |
|||
|
|||
echo "##vso[task.setvariable variable=VSS_NUGET_EXTERNAL_FEED_ENDPOINTS]$endpointCredentials" |
|||
echo "##vso[task.setvariable variable=NUGET_CREDENTIALPROVIDER_SESSIONTOKENCACHE_ENABLED]False" |
|||
else |
|||
echo "No internal endpoints found in NuGet.config" |
|||
fi |
|||
} |
|||
|
|||
# Workaround for https://github.com/microsoft/msbuild/issues/4430 |
|||
function InstallDotNetSdkAndRestoreArcade { |
|||
local dotnetTempDir="$repo_root/dotnet" |
|||
local dotnetSdkVersion="2.1.507" # After experimentation we know this version works when restoring the SDK (compared to 3.0.*) |
|||
local restoreProjPath="$repo_root/eng/common/restore.proj" |
|||
|
|||
echo "Installing dotnet SDK version $dotnetSdkVersion to restore Arcade SDK..." |
|||
echo "<Project Sdk=\"Microsoft.DotNet.Arcade.Sdk\"/>" > "$restoreProjPath" |
|||
|
|||
InstallDotNetSdk "$dotnetTempDir" "$dotnetSdkVersion" |
|||
|
|||
local res=`$dotnetTempDir/dotnet restore $restoreProjPath` |
|||
echo "Arcade SDK restored!" |
|||
|
|||
# Cleanup |
|||
if [ "$restoreProjPath" ]; then |
|||
rm "$restoreProjPath" |
|||
fi |
|||
|
|||
if [ "$dotnetTempDir" ]; then |
|||
rm -r $dotnetTempDir |
|||
fi |
|||
} |
|||
|
|||
source="${BASH_SOURCE[0]}" |
|||
operation='' |
|||
authToken='' |
|||
repoName='' |
|||
|
|||
while [[ $# > 0 ]]; do |
|||
opt="$(echo "$1" | awk '{print tolower($0)}')" |
|||
case "$opt" in |
|||
--operation) |
|||
operation=$2 |
|||
shift |
|||
;; |
|||
--authtoken) |
|||
authToken=$2 |
|||
shift |
|||
;; |
|||
*) |
|||
echo "Invalid argument: $1" |
|||
usage |
|||
exit 1 |
|||
;; |
|||
esac |
|||
|
|||
shift |
|||
done |
|||
|
|||
while [[ -h "$source" ]]; do |
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
source="$(readlink "$source")" |
|||
# if $source was a relative symlink, we need to resolve it relative to the path where the |
|||
# symlink file was located |
|||
[[ $source != /* ]] && source="$scriptroot/$source" |
|||
done |
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
|
|||
. "$scriptroot/tools.sh" |
|||
|
|||
if [ "$operation" = "setup" ]; then |
|||
SetupCredProvider $authToken |
|||
elif [ "$operation" = "install-restore" ]; then |
|||
InstallDotNetSdkAndRestoreArcade |
|||
else |
|||
echo "Unknown operation '$operation'!" |
|||
fi |
|||
@ -0,0 +1,4 @@ |
|||
<!-- Licensed to the .NET Foundation under one or more agreements. The .NET Foundation licenses this file to you under the MIT license. See the LICENSE file in the project root for more information. --> |
|||
<Project> |
|||
<Import Project="Sdk.props" Sdk="Microsoft.DotNet.Arcade.Sdk" /> |
|||
</Project> |
|||
@ -0,0 +1,27 @@ |
|||
<?xml version="1.0" encoding="utf-8"?> |
|||
<!-- Copyright (c) Microsoft. All Rights Reserved. Licensed under the Apache License, Version 2.0. See License.txt in the project root for license information. --> |
|||
<Project Sdk="Microsoft.NET.Sdk"> |
|||
<PropertyGroup> |
|||
<TargetFramework>net472</TargetFramework> |
|||
<ImportDirectoryBuildTargets>false</ImportDirectoryBuildTargets> |
|||
</PropertyGroup> |
|||
<ItemGroup> |
|||
<!-- Clear references, the SDK may add some depending on UsuingToolXxx settings, but we only want to restore the following --> |
|||
<PackageReference Remove="@(PackageReference)"/> |
|||
<PackageReference Include="Microsoft.DotNet.IBCMerge" Version="$(MicrosoftDotNetIBCMergeVersion)" Condition="'$(UsingToolIbcOptimization)' == 'true'" /> |
|||
<PackageReference Include="Drop.App" Version="$(DropAppVersion)" ExcludeAssets="all" Condition="'$(UsingToolVisualStudioIbcTraining)' == 'true'"/> |
|||
</ItemGroup> |
|||
<PropertyGroup> |
|||
<RestoreSources></RestoreSources> |
|||
<RestoreSources Condition="'$(UsingToolIbcOptimization)' == 'true'"> |
|||
https://devdiv.pkgs.visualstudio.com/_packaging/dotnet-core-internal-tooling/nuget/v3/index.json; |
|||
</RestoreSources> |
|||
<RestoreSources Condition="'$(UsingToolVisualStudioIbcTraining)' == 'true'"> |
|||
$(RestoreSources); |
|||
https://devdiv.pkgs.visualstudio.com/_packaging/VS/nuget/v3/index.json; |
|||
</RestoreSources> |
|||
</PropertyGroup> |
|||
|
|||
<!-- Repository extensibility point --> |
|||
<Import Project="$(RepositoryEngineeringDir)InternalTools.props" Condition="Exists('$(RepositoryEngineeringDir)InternalTools.props')" /> |
|||
</Project> |
|||
@ -0,0 +1,27 @@ |
|||
[CmdletBinding(PositionalBinding=$false)] |
|||
Param( |
|||
[string] $verbosity = "minimal", |
|||
[bool] $warnAsError = $true, |
|||
[bool] $nodeReuse = $true, |
|||
[switch] $ci, |
|||
[switch] $prepareMachine, |
|||
[Parameter(ValueFromRemainingArguments=$true)][String[]]$extraArgs |
|||
) |
|||
|
|||
. $PSScriptRoot\tools.ps1 |
|||
|
|||
try { |
|||
if ($ci) { |
|||
$nodeReuse = $false |
|||
} |
|||
|
|||
MSBuild @extraArgs |
|||
} |
|||
catch { |
|||
Write-Host $_ |
|||
Write-Host $_.Exception |
|||
Write-Host $_.ScriptStackTrace |
|||
ExitWithExitCode 1 |
|||
} |
|||
|
|||
ExitWithExitCode 0 |
|||
@ -0,0 +1,58 @@ |
|||
#!/usr/bin/env bash |
|||
|
|||
source="${BASH_SOURCE[0]}" |
|||
|
|||
# resolve $source until the file is no longer a symlink |
|||
while [[ -h "$source" ]]; do |
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
source="$(readlink "$source")" |
|||
# if $source was a relative symlink, we need to resolve it relative to the path where the |
|||
# symlink file was located |
|||
[[ $source != /* ]] && source="$scriptroot/$source" |
|||
done |
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
|
|||
verbosity='minimal' |
|||
warn_as_error=true |
|||
node_reuse=true |
|||
prepare_machine=false |
|||
extra_args='' |
|||
|
|||
while (($# > 0)); do |
|||
lowerI="$(echo $1 | awk '{print tolower($0)}')" |
|||
case $lowerI in |
|||
--verbosity) |
|||
verbosity=$2 |
|||
shift 2 |
|||
;; |
|||
--warnaserror) |
|||
warn_as_error=$2 |
|||
shift 2 |
|||
;; |
|||
--nodereuse) |
|||
node_reuse=$2 |
|||
shift 2 |
|||
;; |
|||
--ci) |
|||
ci=true |
|||
shift 1 |
|||
;; |
|||
--preparemachine) |
|||
prepare_machine=true |
|||
shift 1 |
|||
;; |
|||
*) |
|||
extra_args="$extra_args $1" |
|||
shift 1 |
|||
;; |
|||
esac |
|||
done |
|||
|
|||
. "$scriptroot/tools.sh" |
|||
|
|||
if [[ "$ci" == true ]]; then |
|||
node_reuse=false |
|||
fi |
|||
|
|||
MSBuild $extra_args |
|||
ExitWithExitCode 0 |
|||
@ -0,0 +1,387 @@ |
|||
<# |
|||
.SYNOPSIS |
|||
Helper module to install an archive to a directory |
|||
|
|||
.DESCRIPTION |
|||
Helper module to download and extract an archive to a specified directory |
|||
|
|||
.PARAMETER Uri |
|||
Uri of artifact to download |
|||
|
|||
.PARAMETER InstallDirectory |
|||
Directory to extract artifact contents to |
|||
|
|||
.PARAMETER Force |
|||
Force download / extraction if file or contents already exist. Default = False |
|||
|
|||
.PARAMETER DownloadRetries |
|||
Total number of retry attempts. Default = 5 |
|||
|
|||
.PARAMETER RetryWaitTimeInSeconds |
|||
Wait time between retry attempts in seconds. Default = 30 |
|||
|
|||
.NOTES |
|||
Returns False if download or extraction fail, True otherwise |
|||
#> |
|||
function DownloadAndExtract { |
|||
[CmdletBinding(PositionalBinding=$false)] |
|||
Param ( |
|||
[Parameter(Mandatory=$True)] |
|||
[string] $Uri, |
|||
[Parameter(Mandatory=$True)] |
|||
[string] $InstallDirectory, |
|||
[switch] $Force = $False, |
|||
[int] $DownloadRetries = 5, |
|||
[int] $RetryWaitTimeInSeconds = 30 |
|||
) |
|||
# Define verbose switch if undefined |
|||
$Verbose = $VerbosePreference -Eq "Continue" |
|||
|
|||
$TempToolPath = CommonLibrary\Get-TempPathFilename -Path $Uri |
|||
|
|||
# Download native tool |
|||
$DownloadStatus = CommonLibrary\Get-File -Uri $Uri ` |
|||
-Path $TempToolPath ` |
|||
-DownloadRetries $DownloadRetries ` |
|||
-RetryWaitTimeInSeconds $RetryWaitTimeInSeconds ` |
|||
-Force:$Force ` |
|||
-Verbose:$Verbose |
|||
|
|||
if ($DownloadStatus -Eq $False) { |
|||
Write-Error "Download failed" |
|||
return $False |
|||
} |
|||
|
|||
# Extract native tool |
|||
$UnzipStatus = CommonLibrary\Expand-Zip -ZipPath $TempToolPath ` |
|||
-OutputDirectory $InstallDirectory ` |
|||
-Force:$Force ` |
|||
-Verbose:$Verbose |
|||
|
|||
if ($UnzipStatus -Eq $False) { |
|||
# Retry Download one more time with Force=true |
|||
$DownloadRetryStatus = CommonLibrary\Get-File -Uri $Uri ` |
|||
-Path $TempToolPath ` |
|||
-DownloadRetries 1 ` |
|||
-RetryWaitTimeInSeconds $RetryWaitTimeInSeconds ` |
|||
-Force:$True ` |
|||
-Verbose:$Verbose |
|||
|
|||
if ($DownloadRetryStatus -Eq $False) { |
|||
Write-Error "Last attempt of download failed as well" |
|||
return $False |
|||
} |
|||
|
|||
# Retry unzip again one more time with Force=true |
|||
$UnzipRetryStatus = CommonLibrary\Expand-Zip -ZipPath $TempToolPath ` |
|||
-OutputDirectory $InstallDirectory ` |
|||
-Force:$True ` |
|||
-Verbose:$Verbose |
|||
if ($UnzipRetryStatus -Eq $False) |
|||
{ |
|||
Write-Error "Last attempt of unzip failed as well" |
|||
# Clean up partial zips and extracts |
|||
if (Test-Path $TempToolPath) { |
|||
Remove-Item $TempToolPath -Force |
|||
} |
|||
if (Test-Path $InstallDirectory) { |
|||
Remove-Item $InstallDirectory -Force -Recurse |
|||
} |
|||
return $False |
|||
} |
|||
} |
|||
|
|||
return $True |
|||
} |
|||
|
|||
<# |
|||
.SYNOPSIS |
|||
Download a file, retry on failure |
|||
|
|||
.DESCRIPTION |
|||
Download specified file and retry if attempt fails |
|||
|
|||
.PARAMETER Uri |
|||
Uri of file to download. If Uri is a local path, the file will be copied instead of downloaded |
|||
|
|||
.PARAMETER Path |
|||
Path to download or copy uri file to |
|||
|
|||
.PARAMETER Force |
|||
Overwrite existing file if present. Default = False |
|||
|
|||
.PARAMETER DownloadRetries |
|||
Total number of retry attempts. Default = 5 |
|||
|
|||
.PARAMETER RetryWaitTimeInSeconds |
|||
Wait time between retry attempts in seconds Default = 30 |
|||
|
|||
#> |
|||
function Get-File { |
|||
[CmdletBinding(PositionalBinding=$false)] |
|||
Param ( |
|||
[Parameter(Mandatory=$True)] |
|||
[string] $Uri, |
|||
[Parameter(Mandatory=$True)] |
|||
[string] $Path, |
|||
[int] $DownloadRetries = 5, |
|||
[int] $RetryWaitTimeInSeconds = 30, |
|||
[switch] $Force = $False |
|||
) |
|||
$Attempt = 0 |
|||
|
|||
if ($Force) { |
|||
if (Test-Path $Path) { |
|||
Remove-Item $Path -Force |
|||
} |
|||
} |
|||
if (Test-Path $Path) { |
|||
Write-Host "File '$Path' already exists, skipping download" |
|||
return $True |
|||
} |
|||
|
|||
$DownloadDirectory = Split-Path -ErrorAction Ignore -Path "$Path" -Parent |
|||
if (-Not (Test-Path $DownloadDirectory)) { |
|||
New-Item -path $DownloadDirectory -force -itemType "Directory" | Out-Null |
|||
} |
|||
|
|||
if (Test-Path -IsValid -Path $Uri) { |
|||
Write-Verbose "'$Uri' is a file path, copying file to '$Path'" |
|||
Copy-Item -Path $Uri -Destination $Path |
|||
return $? |
|||
} |
|||
else { |
|||
Write-Verbose "Downloading $Uri" |
|||
while($Attempt -Lt $DownloadRetries) |
|||
{ |
|||
try { |
|||
Invoke-WebRequest -UseBasicParsing -Uri $Uri -OutFile $Path |
|||
Write-Verbose "Downloaded to '$Path'" |
|||
return $True |
|||
} |
|||
catch { |
|||
$Attempt++ |
|||
if ($Attempt -Lt $DownloadRetries) { |
|||
$AttemptsLeft = $DownloadRetries - $Attempt |
|||
Write-Warning "Download failed, $AttemptsLeft attempts remaining, will retry in $RetryWaitTimeInSeconds seconds" |
|||
Start-Sleep -Seconds $RetryWaitTimeInSeconds |
|||
} |
|||
else { |
|||
Write-Error $_ |
|||
Write-Error $_.Exception |
|||
} |
|||
} |
|||
} |
|||
} |
|||
|
|||
return $False |
|||
} |
|||
|
|||
<# |
|||
.SYNOPSIS |
|||
Generate a shim for a native tool |
|||
|
|||
.DESCRIPTION |
|||
Creates a wrapper script (shim) that passes arguments forward to native tool assembly |
|||
|
|||
.PARAMETER ShimName |
|||
The name of the shim |
|||
|
|||
.PARAMETER ShimDirectory |
|||
The directory where shims are stored |
|||
|
|||
.PARAMETER ToolFilePath |
|||
Path to file that shim forwards to |
|||
|
|||
.PARAMETER Force |
|||
Replace shim if already present. Default = False |
|||
|
|||
.NOTES |
|||
Returns $True if generating shim succeeds, $False otherwise |
|||
#> |
|||
function New-ScriptShim { |
|||
[CmdletBinding(PositionalBinding=$false)] |
|||
Param ( |
|||
[Parameter(Mandatory=$True)] |
|||
[string] $ShimName, |
|||
[Parameter(Mandatory=$True)] |
|||
[string] $ShimDirectory, |
|||
[Parameter(Mandatory=$True)] |
|||
[string] $ToolFilePath, |
|||
[Parameter(Mandatory=$True)] |
|||
[string] $BaseUri, |
|||
[switch] $Force |
|||
) |
|||
try { |
|||
Write-Verbose "Generating '$ShimName' shim" |
|||
|
|||
if (-Not (Test-Path $ToolFilePath)){ |
|||
Write-Error "Specified tool file path '$ToolFilePath' does not exist" |
|||
return $False |
|||
} |
|||
|
|||
# WinShimmer is a small .NET Framework program that creates .exe shims to bootstrapped programs |
|||
# Many of the checks for installed programs expect a .exe extension for Windows tools, rather |
|||
# than a .bat or .cmd file. |
|||
# Source: https://github.com/dotnet/arcade/tree/master/src/WinShimmer |
|||
if (-Not (Test-Path "$ShimDirectory\WinShimmer\winshimmer.exe")) { |
|||
$InstallStatus = DownloadAndExtract -Uri "$BaseUri/windows/winshimmer/WinShimmer.zip" ` |
|||
-InstallDirectory $ShimDirectory\WinShimmer ` |
|||
-Force:$Force ` |
|||
-DownloadRetries 2 ` |
|||
-RetryWaitTimeInSeconds 5 ` |
|||
-Verbose:$Verbose |
|||
} |
|||
|
|||
if ((Test-Path (Join-Path $ShimDirectory "$ShimName.exe"))) { |
|||
Write-Host "$ShimName.exe already exists; replacing..." |
|||
Remove-Item (Join-Path $ShimDirectory "$ShimName.exe") |
|||
} |
|||
|
|||
& "$ShimDirectory\WinShimmer\winshimmer.exe" $ShimName $ToolFilePath $ShimDirectory |
|||
return $True |
|||
} |
|||
catch { |
|||
Write-Host $_ |
|||
Write-Host $_.Exception |
|||
return $False |
|||
} |
|||
} |
|||
|
|||
<# |
|||
.SYNOPSIS |
|||
Returns the machine architecture of the host machine |
|||
|
|||
.NOTES |
|||
Returns 'x64' on 64 bit machines |
|||
Returns 'x86' on 32 bit machines |
|||
#> |
|||
function Get-MachineArchitecture { |
|||
$ProcessorArchitecture = $Env:PROCESSOR_ARCHITECTURE |
|||
$ProcessorArchitectureW6432 = $Env:PROCESSOR_ARCHITEW6432 |
|||
if($ProcessorArchitecture -Eq "X86") |
|||
{ |
|||
if(($ProcessorArchitectureW6432 -Eq "") -Or |
|||
($ProcessorArchitectureW6432 -Eq "X86")) { |
|||
return "x86" |
|||
} |
|||
$ProcessorArchitecture = $ProcessorArchitectureW6432 |
|||
} |
|||
if (($ProcessorArchitecture -Eq "AMD64") -Or |
|||
($ProcessorArchitecture -Eq "IA64") -Or |
|||
($ProcessorArchitecture -Eq "ARM64")) { |
|||
return "x64" |
|||
} |
|||
return "x86" |
|||
} |
|||
|
|||
<# |
|||
.SYNOPSIS |
|||
Get the name of a temporary folder under the native install directory |
|||
#> |
|||
function Get-TempDirectory { |
|||
return Join-Path (Get-NativeInstallDirectory) "temp/" |
|||
} |
|||
|
|||
function Get-TempPathFilename { |
|||
[CmdletBinding(PositionalBinding=$false)] |
|||
Param ( |
|||
[Parameter(Mandatory=$True)] |
|||
[string] $Path |
|||
) |
|||
$TempDir = CommonLibrary\Get-TempDirectory |
|||
$TempFilename = Split-Path $Path -leaf |
|||
$TempPath = Join-Path $TempDir $TempFilename |
|||
return $TempPath |
|||
} |
|||
|
|||
<# |
|||
.SYNOPSIS |
|||
Returns the base directory to use for native tool installation |
|||
|
|||
.NOTES |
|||
Returns the value of the NETCOREENG_INSTALL_DIRECTORY if that environment variable |
|||
is set, or otherwise returns an install directory under the %USERPROFILE% |
|||
#> |
|||
function Get-NativeInstallDirectory { |
|||
$InstallDir = $Env:NETCOREENG_INSTALL_DIRECTORY |
|||
if (!$InstallDir) { |
|||
$InstallDir = Join-Path $Env:USERPROFILE ".netcoreeng/native/" |
|||
} |
|||
return $InstallDir |
|||
} |
|||
|
|||
<# |
|||
.SYNOPSIS |
|||
Unzip an archive |
|||
|
|||
.DESCRIPTION |
|||
Powershell module to unzip an archive to a specified directory |
|||
|
|||
.PARAMETER ZipPath (Required) |
|||
Path to archive to unzip |
|||
|
|||
.PARAMETER OutputDirectory (Required) |
|||
Output directory for archive contents |
|||
|
|||
.PARAMETER Force |
|||
Overwrite output directory contents if they already exist |
|||
|
|||
.NOTES |
|||
- Returns True and does not perform an extraction if output directory already exists but Overwrite is not True. |
|||
- Returns True if unzip operation is successful |
|||
- Returns False if Overwrite is True and it is unable to remove contents of OutputDirectory |
|||
- Returns False if unable to extract zip archive |
|||
#> |
|||
function Expand-Zip { |
|||
[CmdletBinding(PositionalBinding=$false)] |
|||
Param ( |
|||
[Parameter(Mandatory=$True)] |
|||
[string] $ZipPath, |
|||
[Parameter(Mandatory=$True)] |
|||
[string] $OutputDirectory, |
|||
[switch] $Force |
|||
) |
|||
|
|||
Write-Verbose "Extracting '$ZipPath' to '$OutputDirectory'" |
|||
try { |
|||
if ((Test-Path $OutputDirectory) -And (-Not $Force)) { |
|||
Write-Host "Directory '$OutputDirectory' already exists, skipping extract" |
|||
return $True |
|||
} |
|||
if (Test-Path $OutputDirectory) { |
|||
Write-Verbose "'Force' is 'True', but '$OutputDirectory' exists, removing directory" |
|||
Remove-Item $OutputDirectory -Force -Recurse |
|||
if ($? -Eq $False) { |
|||
Write-Error "Unable to remove '$OutputDirectory'" |
|||
return $False |
|||
} |
|||
} |
|||
if (-Not (Test-Path $OutputDirectory)) { |
|||
New-Item -path $OutputDirectory -Force -itemType "Directory" | Out-Null |
|||
} |
|||
|
|||
Add-Type -assembly "system.io.compression.filesystem" |
|||
[io.compression.zipfile]::ExtractToDirectory("$ZipPath", "$OutputDirectory") |
|||
if ($? -Eq $False) { |
|||
Write-Error "Unable to extract '$ZipPath'" |
|||
return $False |
|||
} |
|||
} |
|||
catch { |
|||
Write-Host $_ |
|||
Write-Host $_.Exception |
|||
|
|||
return $False |
|||
} |
|||
return $True |
|||
} |
|||
|
|||
export-modulemember -function DownloadAndExtract |
|||
export-modulemember -function Expand-Zip |
|||
export-modulemember -function Get-File |
|||
export-modulemember -function Get-MachineArchitecture |
|||
export-modulemember -function Get-NativeInstallDirectory |
|||
export-modulemember -function Get-TempDirectory |
|||
export-modulemember -function Get-TempPathFilename |
|||
export-modulemember -function New-ScriptShim |
|||
@ -0,0 +1,168 @@ |
|||
#!/usr/bin/env bash |
|||
|
|||
function GetNativeInstallDirectory { |
|||
local install_dir |
|||
|
|||
if [[ -z $NETCOREENG_INSTALL_DIRECTORY ]]; then |
|||
install_dir=$HOME/.netcoreeng/native/ |
|||
else |
|||
install_dir=$NETCOREENG_INSTALL_DIRECTORY |
|||
fi |
|||
|
|||
echo $install_dir |
|||
return 0 |
|||
} |
|||
|
|||
function GetTempDirectory { |
|||
|
|||
echo $(GetNativeInstallDirectory)temp/ |
|||
return 0 |
|||
} |
|||
|
|||
function ExpandZip { |
|||
local zip_path=$1 |
|||
local output_directory=$2 |
|||
local force=${3:-false} |
|||
|
|||
echo "Extracting $zip_path to $output_directory" |
|||
if [[ -d $output_directory ]] && [[ $force = false ]]; then |
|||
echo "Directory '$output_directory' already exists, skipping extract" |
|||
return 0 |
|||
fi |
|||
|
|||
if [[ -d $output_directory ]]; then |
|||
echo "'Force flag enabled, but '$output_directory' exists. Removing directory" |
|||
rm -rf $output_directory |
|||
if [[ $? != 0 ]]; then |
|||
echo Unable to remove '$output_directory'>&2 |
|||
return 1 |
|||
fi |
|||
fi |
|||
|
|||
echo "Creating directory: '$output_directory'" |
|||
mkdir -p $output_directory |
|||
|
|||
echo "Extracting archive" |
|||
tar -xf $zip_path -C $output_directory |
|||
if [[ $? != 0 ]]; then |
|||
echo "Unable to extract '$zip_path'" >&2 |
|||
return 1 |
|||
fi |
|||
|
|||
return 0 |
|||
} |
|||
|
|||
function GetCurrentOS { |
|||
local unameOut="$(uname -s)" |
|||
case $unameOut in |
|||
Linux*) echo "Linux";; |
|||
Darwin*) echo "MacOS";; |
|||
esac |
|||
return 0 |
|||
} |
|||
|
|||
function GetFile { |
|||
local uri=$1 |
|||
local path=$2 |
|||
local force=${3:-false} |
|||
local download_retries=${4:-5} |
|||
local retry_wait_time_seconds=${5:-30} |
|||
|
|||
if [[ -f $path ]]; then |
|||
if [[ $force = false ]]; then |
|||
echo "File '$path' already exists. Skipping download" |
|||
return 0 |
|||
else |
|||
rm -rf $path |
|||
fi |
|||
fi |
|||
|
|||
if [[ -f $uri ]]; then |
|||
echo "'$uri' is a file path, copying file to '$path'" |
|||
cp $uri $path |
|||
return $? |
|||
fi |
|||
|
|||
echo "Downloading $uri" |
|||
# Use curl if available, otherwise use wget |
|||
if command -v curl > /dev/null; then |
|||
curl "$uri" -sSL --retry $download_retries --retry-delay $retry_wait_time_seconds --create-dirs -o "$path" --fail |
|||
else |
|||
wget -q -O "$path" "$uri" --tries="$download_retries" |
|||
fi |
|||
|
|||
return $? |
|||
} |
|||
|
|||
function GetTempPathFileName { |
|||
local path=$1 |
|||
|
|||
local temp_dir=$(GetTempDirectory) |
|||
local temp_file_name=$(basename $path) |
|||
echo $temp_dir$temp_file_name |
|||
return 0 |
|||
} |
|||
|
|||
function DownloadAndExtract { |
|||
local uri=$1 |
|||
local installDir=$2 |
|||
local force=${3:-false} |
|||
local download_retries=${4:-5} |
|||
local retry_wait_time_seconds=${5:-30} |
|||
|
|||
local temp_tool_path=$(GetTempPathFileName $uri) |
|||
|
|||
echo "downloading to: $temp_tool_path" |
|||
|
|||
# Download file |
|||
GetFile "$uri" "$temp_tool_path" $force $download_retries $retry_wait_time_seconds |
|||
if [[ $? != 0 ]]; then |
|||
echo "Failed to download '$uri' to '$temp_tool_path'." >&2 |
|||
return 1 |
|||
fi |
|||
|
|||
# Extract File |
|||
echo "extracting from $temp_tool_path to $installDir" |
|||
ExpandZip "$temp_tool_path" "$installDir" $force $download_retries $retry_wait_time_seconds |
|||
if [[ $? != 0 ]]; then |
|||
echo "Failed to extract '$temp_tool_path' to '$installDir'." >&2 |
|||
return 1 |
|||
fi |
|||
|
|||
return 0 |
|||
} |
|||
|
|||
function NewScriptShim { |
|||
local shimpath=$1 |
|||
local tool_file_path=$2 |
|||
local force=${3:-false} |
|||
|
|||
echo "Generating '$shimpath' shim" |
|||
if [[ -f $shimpath ]]; then |
|||
if [[ $force = false ]]; then |
|||
echo "File '$shimpath' already exists." >&2 |
|||
return 1 |
|||
else |
|||
rm -rf $shimpath |
|||
fi |
|||
fi |
|||
|
|||
if [[ ! -f $tool_file_path ]]; then |
|||
echo "Specified tool file path:'$tool_file_path' does not exist" >&2 |
|||
return 1 |
|||
fi |
|||
|
|||
local shim_contents=$'#!/usr/bin/env bash\n' |
|||
shim_contents+="SHIMARGS="$'$1\n' |
|||
shim_contents+="$tool_file_path"$' $SHIMARGS\n' |
|||
|
|||
# Write shim file |
|||
echo "$shim_contents" > $shimpath |
|||
|
|||
chmod +x $shimpath |
|||
|
|||
echo "Finished generating shim '$shimpath'" |
|||
|
|||
return $? |
|||
} |
|||
|
|||
@ -0,0 +1,117 @@ |
|||
#!/usr/bin/env bash |
|||
|
|||
source="${BASH_SOURCE[0]}" |
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
|
|||
. $scriptroot/common-library.sh |
|||
|
|||
base_uri= |
|||
install_path= |
|||
version= |
|||
clean=false |
|||
force=false |
|||
download_retries=5 |
|||
retry_wait_time_seconds=30 |
|||
|
|||
while (($# > 0)); do |
|||
lowerI="$(echo $1 | awk '{print tolower($0)}')" |
|||
case $lowerI in |
|||
--baseuri) |
|||
base_uri=$2 |
|||
shift 2 |
|||
;; |
|||
--installpath) |
|||
install_path=$2 |
|||
shift 2 |
|||
;; |
|||
--version) |
|||
version=$2 |
|||
shift 2 |
|||
;; |
|||
--clean) |
|||
clean=true |
|||
shift 1 |
|||
;; |
|||
--force) |
|||
force=true |
|||
shift 1 |
|||
;; |
|||
--downloadretries) |
|||
download_retries=$2 |
|||
shift 2 |
|||
;; |
|||
--retrywaittimeseconds) |
|||
retry_wait_time_seconds=$2 |
|||
shift 2 |
|||
;; |
|||
--help) |
|||
echo "Common settings:" |
|||
echo " --baseuri <value> Base file directory or Url wrom which to acquire tool archives" |
|||
echo " --installpath <value> Base directory to install native tool to" |
|||
echo " --clean Don't install the tool, just clean up the current install of the tool" |
|||
echo " --force Force install of tools even if they previously exist" |
|||
echo " --help Print help and exit" |
|||
echo "" |
|||
echo "Advanced settings:" |
|||
echo " --downloadretries Total number of retry attempts" |
|||
echo " --retrywaittimeseconds Wait time between retry attempts in seconds" |
|||
echo "" |
|||
exit 0 |
|||
;; |
|||
esac |
|||
done |
|||
|
|||
tool_name="cmake-test" |
|||
tool_os=$(GetCurrentOS) |
|||
tool_folder=$(echo $tool_os | awk '{print tolower($0)}') |
|||
tool_arch="x86_64" |
|||
tool_name_moniker="$tool_name-$version-$tool_os-$tool_arch" |
|||
tool_install_directory="$install_path/$tool_name/$version" |
|||
tool_file_path="$tool_install_directory/$tool_name_moniker/bin/$tool_name" |
|||
shim_path="$install_path/$tool_name.sh" |
|||
uri="${base_uri}/$tool_folder/$tool_name/$tool_name_moniker.tar.gz" |
|||
|
|||
# Clean up tool and installers |
|||
if [[ $clean = true ]]; then |
|||
echo "Cleaning $tool_install_directory" |
|||
if [[ -d $tool_install_directory ]]; then |
|||
rm -rf $tool_install_directory |
|||
fi |
|||
|
|||
echo "Cleaning $shim_path" |
|||
if [[ -f $shim_path ]]; then |
|||
rm -rf $shim_path |
|||
fi |
|||
|
|||
tool_temp_path=$(GetTempPathFileName $uri) |
|||
echo "Cleaning $tool_temp_path" |
|||
if [[ -f $tool_temp_path ]]; then |
|||
rm -rf $tool_temp_path |
|||
fi |
|||
|
|||
exit 0 |
|||
fi |
|||
|
|||
# Install tool |
|||
if [[ -f $tool_file_path ]] && [[ $force = false ]]; then |
|||
echo "$tool_name ($version) already exists, skipping install" |
|||
exit 0 |
|||
fi |
|||
|
|||
DownloadAndExtract $uri $tool_install_directory $force $download_retries $retry_wait_time_seconds |
|||
|
|||
if [[ $? != 0 ]]; then |
|||
echo "Installation failed" >&2 |
|||
exit 1 |
|||
fi |
|||
|
|||
# Generate Shim |
|||
# Always rewrite shims so that we are referencing the expected version |
|||
NewScriptShim $shim_path $tool_file_path true |
|||
|
|||
if [[ $? != 0 ]]; then |
|||
echo "Shim generation failed" >&2 |
|||
exit 1 |
|||
fi |
|||
|
|||
exit 0 |
|||
@ -0,0 +1,117 @@ |
|||
#!/usr/bin/env bash |
|||
|
|||
source="${BASH_SOURCE[0]}" |
|||
scriptroot="$( cd -P "$( dirname "$source" )" && pwd )" |
|||
|
|||
. $scriptroot/common-library.sh |
|||
|
|||
base_uri= |
|||
install_path= |
|||
version= |
|||
clean=false |
|||
force=false |
|||
download_retries=5 |
|||
retry_wait_time_seconds=30 |
|||
|
|||
while (($# > 0)); do |
|||
lowerI="$(echo $1 | awk '{print tolower($0)}')" |
|||
case $lowerI in |
|||
--baseuri) |
|||
base_uri=$2 |
|||
shift 2 |
|||
;; |
|||
--installpath) |
|||
install_path=$2 |
|||
shift 2 |
|||
;; |
|||
--version) |
|||
version=$2 |
|||
shift 2 |
|||
;; |
|||
--clean) |
|||
clean=true |
|||
shift 1 |
|||
;; |
|||
--force) |
|||
force=true |
|||
shift 1 |
|||
;; |
|||
--downloadretries) |
|||
download_retries=$2 |
|||
shift 2 |
|||
;; |
|||
--retrywaittimeseconds) |
|||
retry_wait_time_seconds=$2 |
|||
shift 2 |
|||
;; |
|||
--help) |
|||
echo "Common settings:" |
|||
echo " --baseuri <value> Base file directory or Url wrom which to acquire tool archives" |
|||
echo " --installpath <value> Base directory to install native tool to" |
|||
echo " --clean Don't install the tool, just clean up the current install of the tool" |
|||
echo " --force Force install of tools even if they previously exist" |
|||
echo " --help Print help and exit" |
|||
echo "" |
|||
echo "Advanced settings:" |
|||
echo " --downloadretries Total number of retry attempts" |
|||
echo " --retrywaittimeseconds Wait time between retry attempts in seconds" |
|||
echo "" |
|||
exit 0 |
|||
;; |
|||
esac |
|||
done |
|||
|
|||
tool_name="cmake" |
|||
tool_os=$(GetCurrentOS) |
|||
tool_folder=$(echo $tool_os | awk '{print tolower($0)}') |
|||
tool_arch="x86_64" |
|||
tool_name_moniker="$tool_name-$version-$tool_os-$tool_arch" |
|||
tool_install_directory="$install_path/$tool_name/$version" |
|||
tool_file_path="$tool_install_directory/$tool_name_moniker/bin/$tool_name" |
|||
shim_path="$install_path/$tool_name.sh" |
|||
uri="${base_uri}/$tool_folder/$tool_name/$tool_name_moniker.tar.gz" |
|||
|
|||
# Clean up tool and installers |
|||
if [[ $clean = true ]]; then |
|||
echo "Cleaning $tool_install_directory" |
|||
if [[ -d $tool_install_directory ]]; then |
|||
rm -rf $tool_install_directory |
|||
fi |
|||
|
|||
echo "Cleaning $shim_path" |
|||
if [[ -f $shim_path ]]; then |
|||
rm -rf $shim_path |
|||
fi |
|||
|
|||
tool_temp_path=$(GetTempPathFileName $uri) |
|||
echo "Cleaning $tool_temp_path" |
|||
if [[ -f $tool_temp_path ]]; then |
|||
rm -rf $tool_temp_path |
|||
fi |
|||
|
|||
exit 0 |
|||
fi |
|||
|
|||
# Install tool |
|||
if [[ -f $tool_file_path ]] && [[ $force = false ]]; then |
|||
echo "$tool_name ($version) already exists, skipping install" |
|||
exit 0 |
|||
fi |
|||
|
|||
DownloadAndExtract $uri $tool_install_directory $force $download_retries $retry_wait_time_seconds |
|||
|
|||
if [[ $? != 0 ]]; then |
|||
echo "Installation failed" >&2 |
|||
exit 1 |
|||
fi |
|||
|
|||
# Generate Shim |
|||
# Always rewrite shims so that we are referencing the expected version |
|||
NewScriptShim $shim_path $tool_file_path true |
|||
|
|||
if [[ $? != 0 ]]; then |
|||
echo "Shim generation failed" >&2 |
|||
exit 1 |
|||
fi |
|||
|
|||
exit 0 |
|||
@ -0,0 +1,130 @@ |
|||
<# |
|||
.SYNOPSIS |
|||
Install native tool |
|||
|
|||
.DESCRIPTION |
|||
Install cmake native tool from Azure blob storage |
|||
|
|||
.PARAMETER InstallPath |
|||
Base directory to install native tool to |
|||
|
|||
.PARAMETER BaseUri |
|||
Base file directory or Url from which to acquire tool archives |
|||
|
|||
.PARAMETER CommonLibraryDirectory |
|||
Path to folder containing common library modules |
|||
|
|||
.PARAMETER Force |
|||
Force install of tools even if they previously exist |
|||
|
|||
.PARAMETER Clean |
|||
Don't install the tool, just clean up the current install of the tool |
|||
|
|||
.PARAMETER DownloadRetries |
|||
Total number of retry attempts |
|||
|
|||
.PARAMETER RetryWaitTimeInSeconds |
|||
Wait time between retry attempts in seconds |
|||
|
|||
.NOTES |
|||
Returns 0 if install succeeds, 1 otherwise |
|||
#> |
|||
[CmdletBinding(PositionalBinding=$false)] |
|||
Param ( |
|||
[Parameter(Mandatory=$True)] |
|||
[string] $ToolName, |
|||
[Parameter(Mandatory=$True)] |
|||
[string] $InstallPath, |
|||
[Parameter(Mandatory=$True)] |
|||
[string] $BaseUri, |
|||
[Parameter(Mandatory=$True)] |
|||
[string] $Version, |
|||
[string] $CommonLibraryDirectory = $PSScriptRoot, |
|||
[switch] $Force = $False, |
|||
[switch] $Clean = $False, |
|||
[int] $DownloadRetries = 5, |
|||
[int] $RetryWaitTimeInSeconds = 30 |
|||
) |
|||
|
|||
# Import common library modules |
|||
Import-Module -Name (Join-Path $CommonLibraryDirectory "CommonLibrary.psm1") |
|||
|
|||
try { |
|||
# Define verbose switch if undefined |
|||
$Verbose = $VerbosePreference -Eq "Continue" |
|||
|
|||
$Arch = CommonLibrary\Get-MachineArchitecture |
|||
$ToolOs = "win64" |
|||
if($Arch -Eq "x32") { |
|||
$ToolOs = "win32" |
|||
} |
|||
$ToolNameMoniker = "$ToolName-$Version-$ToolOs-$Arch" |
|||
$ToolInstallDirectory = Join-Path $InstallPath "$ToolName\$Version\" |
|||
$Uri = "$BaseUri/windows/$ToolName/$ToolNameMoniker.zip" |
|||
$ShimPath = Join-Path $InstallPath "$ToolName.exe" |
|||
|
|||
if ($Clean) { |
|||
Write-Host "Cleaning $ToolInstallDirectory" |
|||
if (Test-Path $ToolInstallDirectory) { |
|||
Remove-Item $ToolInstallDirectory -Force -Recurse |
|||
} |
|||
Write-Host "Cleaning $ShimPath" |
|||
if (Test-Path $ShimPath) { |
|||
Remove-Item $ShimPath -Force |
|||
} |
|||
$ToolTempPath = CommonLibrary\Get-TempPathFilename -Path $Uri |
|||
Write-Host "Cleaning $ToolTempPath" |
|||
if (Test-Path $ToolTempPath) { |
|||
Remove-Item $ToolTempPath -Force |
|||
} |
|||
exit 0 |
|||
} |
|||
|
|||
# Install tool |
|||
if ((Test-Path $ToolInstallDirectory) -And (-Not $Force)) { |
|||
Write-Verbose "$ToolName ($Version) already exists, skipping install" |
|||
} |
|||
else { |
|||
$InstallStatus = CommonLibrary\DownloadAndExtract -Uri $Uri ` |
|||
-InstallDirectory $ToolInstallDirectory ` |
|||
-Force:$Force ` |
|||
-DownloadRetries $DownloadRetries ` |
|||
-RetryWaitTimeInSeconds $RetryWaitTimeInSeconds ` |
|||
-Verbose:$Verbose |
|||
|
|||
if ($InstallStatus -Eq $False) { |
|||
Write-Error "Installation failed" |
|||
exit 1 |
|||
} |
|||
} |
|||
|
|||
$ToolFilePath = Get-ChildItem $ToolInstallDirectory -Recurse -Filter "$ToolName.exe" | % { $_.FullName } |
|||
if (@($ToolFilePath).Length -Gt 1) { |
|||
Write-Error "There are multiple copies of $ToolName in $($ToolInstallDirectory): `n$(@($ToolFilePath | out-string))" |
|||
exit 1 |
|||
} elseif (@($ToolFilePath).Length -Lt 1) { |
|||
Write-Error "$ToolName was not found in $ToolFilePath." |
|||
exit 1 |
|||
} |
|||
|
|||
# Generate shim |
|||
# Always rewrite shims so that we are referencing the expected version |
|||
$GenerateShimStatus = CommonLibrary\New-ScriptShim -ShimName $ToolName ` |
|||
-ShimDirectory $InstallPath ` |
|||
-ToolFilePath "$ToolFilePath" ` |
|||
-BaseUri $BaseUri ` |
|||
-Force:$Force ` |
|||
-Verbose:$Verbose |
|||
|
|||
if ($GenerateShimStatus -Eq $False) { |
|||
Write-Error "Generate shim failed" |
|||
return 1 |
|||
} |
|||
|
|||
exit 0 |
|||
} |
|||
catch { |
|||
Write-Host $_ |
|||
Write-Host $_.Exception |
|||
exit 1 |
|||
} |
|||
@ -0,0 +1,77 @@ |
|||
<Project Sdk="Microsoft.DotNet.Helix.Sdk" DefaultTargets="Test"> |
|||
|
|||
<PropertyGroup Condition="'$(AGENT_OS)' == 'Windows_NT'"> |
|||
<WorkItemCommand>%HELIX_CORRELATION_PAYLOAD%\performance\scripts\benchmarks_ci.py --csproj %HELIX_CORRELATION_PAYLOAD%\performance\$(TargetCsproj)</WorkItemCommand> |
|||
<CliArguments>--dotnet-versions %DOTNET_VERSION% --cli-source-info args --cli-branch %PERFLAB_BRANCH% --cli-commit-sha %PERFLAB_HASH% --cli-repository https://github.com/%PERFLAB_REPO% --cli-source-timestamp %PERFLAB_BUILDTIMESTAMP%</CliArguments> |
|||
<Python>py -3</Python> |
|||
<CoreRun>%HELIX_CORRELATION_PAYLOAD%\Core_Root\CoreRun.exe</CoreRun> |
|||
<HelixPreCommands>$(HelixPreCommands);call %HELIX_CORRELATION_PAYLOAD%\performance\tools\machine-setup.cmd</HelixPreCommands> |
|||
<ArtifactsDirectory>%HELIX_CORRELATION_PAYLOAD%\artifacts\BenchmarkDotNet.Artifacts</ArtifactsDirectory> |
|||
</PropertyGroup> |
|||
|
|||
<PropertyGroup Condition="'$(AGENT_OS)' != 'Windows_NT' and '$(RunFromPerfRepo)' == 'false'"> |
|||
<BaseDirectory>$HELIX_CORRELATION_PAYLOAD</BaseDirectory> |
|||
<PerformanceDirectory>$(BaseDirectory)/performance</PerformanceDirectory> |
|||
</PropertyGroup> |
|||
|
|||
<PropertyGroup Condition="'$(AGENT_OS)' != 'Windows_NT' and '$(RunFromPerfRepo)' == 'true'"> |
|||
<BaseDirectory>$HELIX_WORKITEM_PAYLOAD</BaseDirectory> |
|||
<PerformanceDirectory>$(BaseDirectory)</PerformanceDirectory> |
|||
</PropertyGroup> |
|||
|
|||
<PropertyGroup Condition="'$(AGENT_OS)' != 'Windows_NT'"> |
|||
<WorkItemCommand>$(PerformanceDirectory)/scripts/benchmarks_ci.py --csproj $(PerformanceDirectory)/$(TargetCsproj)</WorkItemCommand> |
|||
<CliArguments>--dotnet-versions $DOTNET_VERSION --cli-source-info args --cli-branch $PERFLAB_BRANCH --cli-commit-sha $PERFLAB_HASH --cli-repository https://github.com/$PERFLAB_REPO --cli-source-timestamp $PERFLAB_BUILDTIMESTAMP</CliArguments> |
|||
<Python>python3</Python> |
|||
<CoreRun>$(BaseDirectory)/Core_Root/corerun</CoreRun> |
|||
<HelixPreCommands>$(HelixPreCommands);chmod +x $(PerformanceDirectory)/tools/machine-setup.sh;. $(PerformanceDirectory)/tools/machine-setup.sh</HelixPreCommands> |
|||
<ArtifactsDirectory>$(BaseDirectory)/artifacts/BenchmarkDotNet.Artifacts</ArtifactsDirectory> |
|||
</PropertyGroup> |
|||
|
|||
<PropertyGroup Condition="'$(UseCoreRun)' == 'true'"> |
|||
<CoreRunArgument>--corerun $(CoreRun)</CoreRunArgument> |
|||
</PropertyGroup> |
|||
|
|||
<PropertyGroup Condition="'$(WorkItemCommand)' != ''"> |
|||
<WorkItemCommand>$(Python) $(WorkItemCommand) --incremental no --architecture $(Architecture) -f $(_Framework) $(PerfLabArguments)</WorkItemCommand> |
|||
</PropertyGroup> |
|||
|
|||
<PropertyGroup Condition="'$(_Framework)' != 'net461'"> |
|||
<WorkItemCommand>$(WorkItemCommand) $(CliArguments)</WorkItemCommand> |
|||
</PropertyGroup> |
|||
|
|||
<ItemGroup> |
|||
<HelixCorrelationPayload Include="$(CorrelationPayloadDirectory)"> |
|||
<PayloadDirectory>%(Identity)</PayloadDirectory> |
|||
</HelixCorrelationPayload> |
|||
</ItemGroup> |
|||
|
|||
<PropertyGroup> |
|||
<PartitionCount>5</PartitionCount> |
|||
</PropertyGroup> |
|||
<ItemGroup> |
|||
<Partition Include="$(BuildConfig).Partition0" Index="0" /> |
|||
<Partition Include="$(BuildConfig).Partition1" Index="1" /> |
|||
<Partition Include="$(BuildConfig).Partition2" Index="2" /> |
|||
<Partition Include="$(BuildConfig).Partition3" Index="3" /> |
|||
<Partition Include="$(BuildConfig).Partition4" Index="4" /> |
|||
</ItemGroup> |
|||
|
|||
<!-- |
|||
Partition the Microbenchmarks project, but nothing else |
|||
--> |
|||
<ItemGroup Condition="$(TargetCsproj.Contains('MicroBenchmarks.csproj'))"> |
|||
<HelixWorkItem Include="@(Partition)"> |
|||
<PayloadDirectory>$(WorkItemDirectory)</PayloadDirectory> |
|||
<Command>$(WorkItemCommand) --bdn-arguments="--anyCategories $(BDNCategories) $(ExtraBenchmarkDotNetArguments) $(CoreRunArgument) --artifacts $(ArtifactsDirectory) --partition-count $(PartitionCount) --partition-index %(HelixWorkItem.Index)"</Command> |
|||
<Timeout>4:00</Timeout> |
|||
</HelixWorkItem> |
|||
</ItemGroup> |
|||
<ItemGroup Condition="!$(TargetCsproj.Contains('MicroBenchmarks.csproj'))"> |
|||
<HelixWorkItem Include="$(BuildConfig).WorkItem"> |
|||
<PayloadDirectory>$(WorkItemDirectory)</PayloadDirectory> |
|||
<Command>$(WorkItemCommand) --bdn-arguments="--anyCategories $(BDNCategories) $(ExtraBenchmarkDotNetArguments) $(CoreRunArgument) --artifacts $(ArtifactsDirectory)"</Command> |
|||
<Timeout>4:00</Timeout> |
|||
</HelixWorkItem> |
|||
</ItemGroup> |
|||
</Project> |
|||
@ -0,0 +1,91 @@ |
|||
Param( |
|||
[string] $SourceDirectory=$env:BUILD_SOURCESDIRECTORY, |
|||
[string] $CoreRootDirectory, |
|||
[string] $Architecture="x64", |
|||
[string] $Framework="netcoreapp3.0", |
|||
[string] $CompilationMode="Tiered", |
|||
[string] $Repository=$env:BUILD_REPOSITORY_NAME, |
|||
[string] $Branch=$env:BUILD_SOURCEBRANCH, |
|||
[string] $CommitSha=$env:BUILD_SOURCEVERSION, |
|||
[string] $BuildNumber=$env:BUILD_BUILDNUMBER, |
|||
[string] $RunCategories="coreclr corefx", |
|||
[string] $Csproj="src\benchmarks\micro\MicroBenchmarks.csproj", |
|||
[string] $Kind="micro", |
|||
[switch] $Internal, |
|||
[string] $Configurations="CompilationMode=$CompilationMode" |
|||
) |
|||
|
|||
$RunFromPerformanceRepo = ($Repository -eq "dotnet/performance") |
|||
$UseCoreRun = ($CoreRootDirectory -ne [string]::Empty) |
|||
|
|||
$PayloadDirectory = (Join-Path $SourceDirectory "Payload") |
|||
$PerformanceDirectory = (Join-Path $PayloadDirectory "performance") |
|||
$WorkItemDirectory = (Join-Path $SourceDirectory "workitem") |
|||
$ExtraBenchmarkDotNetArguments = "--iterationCount 1 --warmupCount 0 --invocationCount 1 --unrollFactor 1 --strategy ColdStart --stopOnFirstError true" |
|||
$Creator = $env:BUILD_DEFINITIONNAME |
|||
$PerfLabArguments = "" |
|||
$HelixSourcePrefix = "pr" |
|||
|
|||
$Queue = "Windows.10.Amd64.ClientRS4.DevEx.15.8.Open" |
|||
|
|||
if ($Framework.StartsWith("netcoreapp")) { |
|||
$Queue = "Windows.10.Amd64.ClientRS4.Open" |
|||
} |
|||
|
|||
if ($Internal) { |
|||
$Queue = "Windows.10.Amd64.ClientRS5.Perf" |
|||
$PerfLabArguments = "--upload-to-perflab-container" |
|||
$ExtraBenchmarkDotNetArguments = "" |
|||
$Creator = "" |
|||
$HelixSourcePrefix = "official" |
|||
} |
|||
|
|||
$CommonSetupArguments="--frameworks $Framework --queue $Queue --build-number $BuildNumber --build-configs $Configurations" |
|||
$SetupArguments = "--repository https://github.com/$Repository --branch $Branch --get-perf-hash --commit-sha $CommitSha $CommonSetupArguments" |
|||
|
|||
if ($RunFromPerformanceRepo) { |
|||
$SetupArguments = "--perf-hash $CommitSha $CommonSetupArguments" |
|||
|
|||
robocopy $SourceDirectory $PerformanceDirectory /E /XD $PayloadDirectory $SourceDirectory\artifacts $SourceDirectory\.git |
|||
} |
|||
else { |
|||
git clone --branch master --depth 1 --quiet https://github.com/dotnet/performance $PerformanceDirectory |
|||
} |
|||
|
|||
if ($UseCoreRun) { |
|||
$NewCoreRoot = (Join-Path $PayloadDirectory "Core_Root") |
|||
Move-Item -Path $CoreRootDirectory -Destination $NewCoreRoot |
|||
} |
|||
|
|||
$DocsDir = (Join-Path $PerformanceDirectory "docs") |
|||
robocopy $DocsDir $WorkItemDirectory |
|||
|
|||
# Set variables that we will need to have in future steps |
|||
$ci = $true |
|||
|
|||
. "$PSScriptRoot\..\pipeline-logging-functions.ps1" |
|||
|
|||
# Directories |
|||
Write-PipelineSetVariable -Name 'PayloadDirectory' -Value "$PayloadDirectory" -IsMultiJobVariable $false |
|||
Write-PipelineSetVariable -Name 'PerformanceDirectory' -Value "$PerformanceDirectory" -IsMultiJobVariable $false |
|||
Write-PipelineSetVariable -Name 'WorkItemDirectory' -Value "$WorkItemDirectory" -IsMultiJobVariable $false |
|||
|
|||
# Script Arguments |
|||
Write-PipelineSetVariable -Name 'Python' -Value "py -3" -IsMultiJobVariable $false |
|||
Write-PipelineSetVariable -Name 'ExtraBenchmarkDotNetArguments' -Value "$ExtraBenchmarkDotNetArguments" -IsMultiJobVariable $false |
|||
Write-PipelineSetVariable -Name 'SetupArguments' -Value "$SetupArguments" -IsMultiJobVariable $false |
|||
Write-PipelineSetVariable -Name 'PerfLabArguments' -Value "$PerfLabArguments" -IsMultiJobVariable $false |
|||
Write-PipelineSetVariable -Name 'BDNCategories' -Value "$RunCategories" -IsMultiJobVariable $false |
|||
Write-PipelineSetVariable -Name 'TargetCsproj' -Value "$Csproj" -IsMultiJobVariable $false |
|||
Write-PipelineSetVariable -Name 'Kind' -Value "$Kind" -IsMultiJobVariable $false |
|||
Write-PipelineSetVariable -Name 'Architecture' -Value "$Architecture" -IsMultiJobVariable $false |
|||
Write-PipelineSetVariable -Name 'UseCoreRun' -Value "$UseCoreRun" -IsMultiJobVariable $false |
|||
Write-PipelineSetVariable -Name 'RunFromPerfRepo' -Value "$RunFromPerformanceRepo" -IsMultiJobVariable $false |
|||
|
|||
# Helix Arguments |
|||
Write-PipelineSetVariable -Name 'Creator' -Value "$Creator" -IsMultiJobVariable $false |
|||
Write-PipelineSetVariable -Name 'Queue' -Value "$Queue" -IsMultiJobVariable $false |
|||
Write-PipelineSetVariable -Name 'HelixSourcePrefix' -Value "$HelixSourcePrefix" -IsMultiJobVariable $false |
|||
Write-PipelineSetVariable -Name '_BuildConfig' -Value "$Architecture.$Kind.$Framework" -IsMultiJobVariable $false |
|||
|
|||
exit 0 |
|||
@ -0,0 +1,176 @@ |
|||
#!/usr/bin/env bash |
|||
|
|||
source_directory=$BUILD_SOURCESDIRECTORY |
|||
core_root_directory= |
|||
architecture=x64 |
|||
framework=netcoreapp3.0 |
|||
compilation_mode=tiered |
|||
repository=$BUILD_REPOSITORY_NAME |
|||
branch=$BUILD_SOURCEBRANCH |
|||
commit_sha=$BUILD_SOURCEVERSION |
|||
build_number=$BUILD_BUILDNUMBER |
|||
internal=false |
|||
kind="micro" |
|||
run_categories="coreclr corefx" |
|||
csproj="src\benchmarks\micro\MicroBenchmarks.csproj" |
|||
configurations= |
|||
run_from_perf_repo=false |
|||
use_core_run=true |
|||
|
|||
while (($# > 0)); do |
|||
lowerI="$(echo $1 | awk '{print tolower($0)}')" |
|||
case $lowerI in |
|||
--sourcedirectory) |
|||
source_directory=$2 |
|||
shift 2 |
|||
;; |
|||
--corerootdirectory) |
|||
core_root_directory=$2 |
|||
shift 2 |
|||
;; |
|||
--architecture) |
|||
architecture=$2 |
|||
shift 2 |
|||
;; |
|||
--framework) |
|||
framework=$2 |
|||
shift 2 |
|||
;; |
|||
--compilationmode) |
|||
compilation_mode=$2 |
|||
shift 2 |
|||
;; |
|||
--repository) |
|||
repository=$2 |
|||
shift 2 |
|||
;; |
|||
--branch) |
|||
branch=$2 |
|||
shift 2 |
|||
;; |
|||
--commitsha) |
|||
commit_sha=$2 |
|||
shift 2 |
|||
;; |
|||
--buildnumber) |
|||
build_number=$2 |
|||
shift 2 |
|||
;; |
|||
--kind) |
|||
kind=$2 |
|||
shift 2 |
|||
;; |
|||
--runcategories) |
|||
run_categories=$2 |
|||
shift 2 |
|||
;; |
|||
--csproj) |
|||
csproj=$2 |
|||
shift 2 |
|||
;; |
|||
--internal) |
|||
internal=true |
|||
shift 1 |
|||
;; |
|||
--configurations) |
|||
configurations=$2 |
|||
shift 2 |
|||
;; |
|||
--help) |
|||
echo "Common settings:" |
|||
echo " --corerootdirectory <value> Directory where Core_Root exists, if running perf testing with --corerun" |
|||
echo " --architecture <value> Architecture of the testing being run" |
|||
echo " --configurations <value> List of key=value pairs that will be passed to perf testing infrastructure." |
|||
echo " ex: --configurations \"CompilationMode=Tiered OptimzationLevel=PGO\"" |
|||
echo " --help Print help and exit" |
|||
echo "" |
|||
echo "Advanced settings:" |
|||
echo " --framework <value> The framework to run, if not running in master" |
|||
echo " --compliationmode <value> The compilation mode if not passing --configurations" |
|||
echo " --sourcedirectory <value> The directory of the sources. Defaults to env:BUILD_SOURCESDIRECTORY" |
|||
echo " --repository <value> The name of the repository in the <owner>/<repository name> format. Defaults to env:BUILD_REPOSITORY_NAME" |
|||
echo " --branch <value> The name of the branch. Defaults to env:BUILD_SOURCEBRANCH" |
|||
echo " --commitsha <value> The commit sha1 to run against. Defaults to env:BUILD_SOURCEVERSION" |
|||
echo " --buildnumber <value> The build number currently running. Defaults to env:BUILD_BUILDNUMBER" |
|||
echo " --csproj The relative path to the benchmark csproj whose tests should be run. Defaults to src\benchmarks\micro\MicroBenchmarks.csproj" |
|||
echo " --kind <value> Related to csproj. The kind of benchmarks that should be run. Defaults to micro" |
|||
echo " --runcategories <value> Related to csproj. Categories of benchmarks to run. Defaults to \"coreclr corefx\"" |
|||
echo " --internal If the benchmarks are running as an official job." |
|||
echo "" |
|||
exit 0 |
|||
;; |
|||
esac |
|||
done |
|||
|
|||
if [[ "$repository" == "dotnet/performance" ]]; then |
|||
run_from_perf_repo=true |
|||
fi |
|||
|
|||
if [ -z "$configurations" ]; then |
|||
configurations="CompliationMode=$compilation_mode" |
|||
fi |
|||
|
|||
if [ -z "$core_root_directory" ]; then |
|||
use_core_run=false |
|||
fi |
|||
|
|||
payload_directory=$source_directory/Payload |
|||
performance_directory=$payload_directory/performance |
|||
workitem_directory=$source_directory/workitem |
|||
extra_benchmark_dotnet_arguments="--iterationCount 1 --warmupCount 0 --invocationCount 1 --unrollFactor 1 --strategy ColdStart --stopOnFirstError true" |
|||
perflab_arguments= |
|||
queue=Ubuntu.1804.Amd64.Open |
|||
creator=$BUILD_DEFINITIONNAME |
|||
helix_source_prefix="pr" |
|||
|
|||
if [[ "$internal" == true ]]; then |
|||
perflab_arguments="--upload-to-perflab-container" |
|||
helix_source_prefix="official" |
|||
creator= |
|||
extra_benchmark_dotnet_arguments= |
|||
|
|||
if [[ "$architecture" = "arm64" ]]; then |
|||
queue=Ubuntu.1804.Arm64.Perf |
|||
else |
|||
queue=Ubuntu.1804.Amd64.Perf |
|||
fi |
|||
fi |
|||
|
|||
common_setup_arguments="--frameworks $framework --queue $queue --build-number $build_number --build-configs $configurations" |
|||
setup_arguments="--repository https://github.com/$repository --branch $branch --get-perf-hash --commit-sha $commit_sha $common_setup_arguments" |
|||
|
|||
if [[ "$run_from_perf_repo" = true ]]; then |
|||
payload_directory= |
|||
workitem_directory=$source_directory |
|||
performance_directory=$workitem_directory |
|||
setup_arguments="--perf-hash $commit_sha $common_setup_arguments" |
|||
else |
|||
git clone --branch master --depth 1 --quiet https://github.com/dotnet/performance $performance_directory |
|||
|
|||
docs_directory=$performance_directory/docs |
|||
mv $docs_directory $workitem_directory |
|||
fi |
|||
|
|||
if [[ "$use_core_run" = true ]]; then |
|||
new_core_root=$payload_directory/Core_Root |
|||
mv $core_root_directory $new_core_root |
|||
fi |
|||
|
|||
# Make sure all of our variables are available for future steps |
|||
echo "##vso[task.setvariable variable=UseCoreRun]$use_core_run" |
|||
echo "##vso[task.setvariable variable=Architecture]$architecture" |
|||
echo "##vso[task.setvariable variable=PayloadDirectory]$payload_directory" |
|||
echo "##vso[task.setvariable variable=PerformanceDirectory]$performance_directory" |
|||
echo "##vso[task.setvariable variable=WorkItemDirectory]$workitem_directory" |
|||
echo "##vso[task.setvariable variable=Queue]$queue" |
|||
echo "##vso[task.setvariable variable=SetupArguments]$setup_arguments" |
|||
echo "##vso[task.setvariable variable=Python]python3" |
|||
echo "##vso[task.setvariable variable=PerfLabArguments]$perflab_arguments" |
|||
echo "##vso[task.setvariable variable=ExtraBenchmarkDotNetArguments]$extra_benchmark_dotnet_arguments" |
|||
echo "##vso[task.setvariable variable=BDNCategories]$run_categories" |
|||
echo "##vso[task.setvariable variable=TargetCsproj]$csproj" |
|||
echo "##vso[task.setvariable variable=RunFromPerfRepo]$run_from_perf_repo" |
|||
echo "##vso[task.setvariable variable=Creator]$creator" |
|||
echo "##vso[task.setvariable variable=HelixSourcePrefix]$helix_source_prefix" |
|||
echo "##vso[task.setvariable variable=Kind]$kind" |
|||
echo "##vso[task.setvariable variable=_BuildConfig]$architecture.$kind.$framework" |
|||
@ -0,0 +1,234 @@ |
|||
# Source for this file was taken from https://github.com/microsoft/azure-pipelines-task-lib/blob/11c9439d4af17e6475d9fe058e6b2e03914d17e6/powershell/VstsTaskSdk/LoggingCommandFunctions.ps1 and modified. |
|||
|
|||
# NOTE: You should not be calling these method directly as they are likely to change. Instead you should be calling the Write-Pipeline* functions defined in tools.ps1 |
|||
|
|||
$script:loggingCommandPrefix = '##vso[' |
|||
$script:loggingCommandEscapeMappings = @( # TODO: WHAT ABOUT "="? WHAT ABOUT "%"? |
|||
New-Object psobject -Property @{ Token = ';' ; Replacement = '%3B' } |
|||
New-Object psobject -Property @{ Token = "`r" ; Replacement = '%0D' } |
|||
New-Object psobject -Property @{ Token = "`n" ; Replacement = '%0A' } |
|||
New-Object psobject -Property @{ Token = "]" ; Replacement = '%5D' } |
|||
) |
|||
# TODO: BUG: Escape % ??? |
|||
# TODO: Add test to verify don't need to escape "=". |
|||
|
|||
function Write-PipelineTelemetryError { |
|||
[CmdletBinding()] |
|||
param( |
|||
[Parameter(Mandatory = $true)] |
|||
[string]$Category, |
|||
[Parameter(Mandatory = $true)] |
|||
[string]$Message, |
|||
[Parameter(Mandatory = $false)] |
|||
[string]$Type = 'error', |
|||
[string]$ErrCode, |
|||
[string]$SourcePath, |
|||
[string]$LineNumber, |
|||
[string]$ColumnNumber, |
|||
[switch]$AsOutput) |
|||
|
|||
$PSBoundParameters.Remove("Category") | Out-Null |
|||
|
|||
$Message = "(NETCORE_ENGINEERING_TELEMETRY=$Category) $Message" |
|||
$PSBoundParameters.Remove("Message") | Out-Null |
|||
$PSBoundParameters.Add("Message", $Message) |
|||
|
|||
Write-PipelineTaskError @PSBoundParameters |
|||
} |
|||
|
|||
function Write-PipelineTaskError { |
|||
[CmdletBinding()] |
|||
param( |
|||
[Parameter(Mandatory = $true)] |
|||
[string]$Message, |
|||
[Parameter(Mandatory = $false)] |
|||
[string]$Type = 'error', |
|||
[string]$ErrCode, |
|||
[string]$SourcePath, |
|||
[string]$LineNumber, |
|||
[string]$ColumnNumber, |
|||
[switch]$AsOutput) |
|||
|
|||
if(!$ci) { |
|||
if($Type -eq 'error') { |
|||
Write-Host $Message -ForegroundColor Red |
|||
return |
|||
} |
|||
elseif ($Type -eq 'warning') { |
|||
Write-Host $Message -ForegroundColor Yellow |
|||
return |
|||
} |
|||
} |
|||
|
|||
if(($Type -ne 'error') -and ($Type -ne 'warning')) { |
|||
Write-Host $Message |
|||
return |
|||
} |
|||
if(-not $PSBoundParameters.ContainsKey('Type')) { |
|||
$PSBoundParameters.Add('Type', 'error') |
|||
} |
|||
Write-LogIssue @PSBoundParameters |
|||
} |
|||
|
|||
function Write-PipelineSetVariable { |
|||
[CmdletBinding()] |
|||
param( |
|||
[Parameter(Mandatory = $true)] |
|||
[string]$Name, |
|||
[string]$Value, |
|||
[switch]$Secret, |
|||
[switch]$AsOutput, |
|||
[bool]$IsMultiJobVariable=$true) |
|||
|
|||
if($ci) { |
|||
Write-LoggingCommand -Area 'task' -Event 'setvariable' -Data $Value -Properties @{ |
|||
'variable' = $Name |
|||
'isSecret' = $Secret |
|||
'isOutput' = $IsMultiJobVariable |
|||
} -AsOutput:$AsOutput |
|||
} |
|||
} |
|||
|
|||
function Write-PipelinePrependPath { |
|||
[CmdletBinding()] |
|||
param( |
|||
[Parameter(Mandatory=$true)] |
|||
[string]$Path, |
|||
[switch]$AsOutput) |
|||
if($ci) { |
|||
Write-LoggingCommand -Area 'task' -Event 'prependpath' -Data $Path -AsOutput:$AsOutput |
|||
} |
|||
} |
|||
|
|||
<######################################## |
|||
# Private functions. |
|||
########################################> |
|||
function Format-LoggingCommandData { |
|||
[CmdletBinding()] |
|||
param([string]$Value, [switch]$Reverse) |
|||
|
|||
if (!$Value) { |
|||
return '' |
|||
} |
|||
|
|||
if (!$Reverse) { |
|||
foreach ($mapping in $script:loggingCommandEscapeMappings) { |
|||
$Value = $Value.Replace($mapping.Token, $mapping.Replacement) |
|||
} |
|||
} else { |
|||
for ($i = $script:loggingCommandEscapeMappings.Length - 1 ; $i -ge 0 ; $i--) { |
|||
$mapping = $script:loggingCommandEscapeMappings[$i] |
|||
$Value = $Value.Replace($mapping.Replacement, $mapping.Token) |
|||
} |
|||
} |
|||
|
|||
return $Value |
|||
} |
|||
|
|||
function Format-LoggingCommand { |
|||
[CmdletBinding()] |
|||
param( |
|||
[Parameter(Mandatory = $true)] |
|||
[string]$Area, |
|||
[Parameter(Mandatory = $true)] |
|||
[string]$Event, |
|||
[string]$Data, |
|||
[hashtable]$Properties) |
|||
|
|||
# Append the preamble. |
|||
[System.Text.StringBuilder]$sb = New-Object -TypeName System.Text.StringBuilder |
|||
$null = $sb.Append($script:loggingCommandPrefix).Append($Area).Append('.').Append($Event) |
|||
|
|||
# Append the properties. |
|||
if ($Properties) { |
|||
$first = $true |
|||
foreach ($key in $Properties.Keys) { |
|||
[string]$value = Format-LoggingCommandData $Properties[$key] |
|||
if ($value) { |
|||
if ($first) { |
|||
$null = $sb.Append(' ') |
|||
$first = $false |
|||
} else { |
|||
$null = $sb.Append(';') |
|||
} |
|||
|
|||
$null = $sb.Append("$key=$value") |
|||
} |
|||
} |
|||
} |
|||
|
|||
# Append the tail and output the value. |
|||
$Data = Format-LoggingCommandData $Data |
|||
$sb.Append(']').Append($Data).ToString() |
|||
} |
|||
|
|||
function Write-LoggingCommand { |
|||
[CmdletBinding(DefaultParameterSetName = 'Parameters')] |
|||
param( |
|||
[Parameter(Mandatory = $true, ParameterSetName = 'Parameters')] |
|||
[string]$Area, |
|||
[Parameter(Mandatory = $true, ParameterSetName = 'Parameters')] |
|||
[string]$Event, |
|||
[Parameter(ParameterSetName = 'Parameters')] |
|||
[string]$Data, |
|||
[Parameter(ParameterSetName = 'Parameters')] |
|||
[hashtable]$Properties, |
|||
[Parameter(Mandatory = $true, ParameterSetName = 'Object')] |
|||
$Command, |
|||
[switch]$AsOutput) |
|||
|
|||
if ($PSCmdlet.ParameterSetName -eq 'Object') { |
|||
Write-LoggingCommand -Area $Command.Area -Event $Command.Event -Data $Command.Data -Properties $Command.Properties -AsOutput:$AsOutput |
|||
return |
|||
} |
|||
|
|||
$command = Format-LoggingCommand -Area $Area -Event $Event -Data $Data -Properties $Properties |
|||
if ($AsOutput) { |
|||
$command |
|||
} else { |
|||
Write-Host $command |
|||
} |
|||
} |
|||
|
|||
function Write-LogIssue { |
|||
[CmdletBinding()] |
|||
param( |
|||
[ValidateSet('warning', 'error')] |
|||
[Parameter(Mandatory = $true)] |
|||
[string]$Type, |
|||
[string]$Message, |
|||
[string]$ErrCode, |
|||
[string]$SourcePath, |
|||
[string]$LineNumber, |
|||
[string]$ColumnNumber, |
|||
[switch]$AsOutput) |
|||
|
|||
$command = Format-LoggingCommand -Area 'task' -Event 'logissue' -Data $Message -Properties @{ |
|||
'type' = $Type |
|||
'code' = $ErrCode |
|||
'sourcepath' = $SourcePath |
|||
'linenumber' = $LineNumber |
|||
'columnnumber' = $ColumnNumber |
|||
} |
|||
if ($AsOutput) { |
|||
return $command |
|||
} |
|||
|
|||
if ($Type -eq 'error') { |
|||
$foregroundColor = $host.PrivateData.ErrorForegroundColor |
|||
$backgroundColor = $host.PrivateData.ErrorBackgroundColor |
|||
if ($foregroundColor -isnot [System.ConsoleColor] -or $backgroundColor -isnot [System.ConsoleColor]) { |
|||
$foregroundColor = [System.ConsoleColor]::Red |
|||
$backgroundColor = [System.ConsoleColor]::Black |
|||
} |
|||
} else { |
|||
$foregroundColor = $host.PrivateData.WarningForegroundColor |
|||
$backgroundColor = $host.PrivateData.WarningBackgroundColor |
|||
if ($foregroundColor -isnot [System.ConsoleColor] -or $backgroundColor -isnot [System.ConsoleColor]) { |
|||
$foregroundColor = [System.ConsoleColor]::Yellow |
|||
$backgroundColor = [System.ConsoleColor]::Black |
|||
} |
|||
} |
|||
|
|||
Write-Host $command -ForegroundColor $foregroundColor -BackgroundColor $backgroundColor |
|||
} |
|||
@ -0,0 +1,172 @@ |
|||
#!/usr/bin/env bash |
|||
|
|||
function Write-PipelineTelemetryError { |
|||
local telemetry_category='' |
|||
local function_args=() |
|||
local message='' |
|||
while [[ $# -gt 0 ]]; do |
|||
opt="$(echo "${1/#--/-}" | awk '{print tolower($0)}')" |
|||
case "$opt" in |
|||
-category|-c) |
|||
telemetry_category=$2 |
|||
shift |
|||
;; |
|||
-*) |
|||
function_args+=("$1 $2") |
|||
shift |
|||
;; |
|||
*) |
|||
message=$* |
|||
;; |
|||
esac |
|||
shift |
|||
done |
|||
|
|||
if [[ "$ci" != true ]]; then |
|||
echo "$message" >&2 |
|||
return |
|||
fi |
|||
|
|||
message="(NETCORE_ENGINEERING_TELEMETRY=$telemetry_category) $message" |
|||
function_args+=("$message") |
|||
|
|||
Write-PipelineTaskError $function_args |
|||
} |
|||
|
|||
function Write-PipelineTaskError { |
|||
if [[ "$ci" != true ]]; then |
|||
echo "$@" >&2 |
|||
return |
|||
fi |
|||
|
|||
local message_type="error" |
|||
local sourcepath='' |
|||
local linenumber='' |
|||
local columnnumber='' |
|||
local error_code='' |
|||
|
|||
while [[ $# -gt 0 ]]; do |
|||
opt="$(echo "${1/#--/-}" | awk '{print tolower($0)}')" |
|||
case "$opt" in |
|||
-type|-t) |
|||
message_type=$2 |
|||
shift |
|||
;; |
|||
-sourcepath|-s) |
|||
sourcepath=$2 |
|||
shift |
|||
;; |
|||
-linenumber|-ln) |
|||
linenumber=$2 |
|||
shift |
|||
;; |
|||
-columnnumber|-cn) |
|||
columnnumber=$2 |
|||
shift |
|||
;; |
|||
-errcode|-e) |
|||
error_code=$2 |
|||
shift |
|||
;; |
|||
*) |
|||
break |
|||
;; |
|||
esac |
|||
|
|||
shift |
|||
done |
|||
|
|||
local message="##vso[task.logissue" |
|||
|
|||
message="$message type=$message_type" |
|||
|
|||
if [ -n "$sourcepath" ]; then |
|||
message="$message;sourcepath=$sourcepath" |
|||
fi |
|||
|
|||
if [ -n "$linenumber" ]; then |
|||
message="$message;linenumber=$linenumber" |
|||
fi |
|||
|
|||
if [ -n "$columnnumber" ]; then |
|||
message="$message;columnnumber=$columnnumber" |
|||
fi |
|||
|
|||
if [ -n "$error_code" ]; then |
|||
message="$message;code=$error_code" |
|||
fi |
|||
|
|||
message="$message]$*" |
|||
echo "$message" |
|||
} |
|||
|
|||
function Write-PipelineSetVariable { |
|||
if [[ "$ci" != true ]]; then |
|||
return |
|||
fi |
|||
|
|||
local name='' |
|||
local value='' |
|||
local secret=false |
|||
local as_output=false |
|||
local is_multi_job_variable=true |
|||
|
|||
while [[ $# -gt 0 ]]; do |
|||
opt="$(echo "${1/#--/-}" | awk '{print tolower($0)}')" |
|||
case "$opt" in |
|||
-name|-n) |
|||
name=$2 |
|||
shift |
|||
;; |
|||
-value|-v) |
|||
value=$2 |
|||
shift |
|||
;; |
|||
-secret|-s) |
|||
secret=true |
|||
;; |
|||
-as_output|-a) |
|||
as_output=true |
|||
;; |
|||
-is_multi_job_variable|-i) |
|||
is_multi_job_variable=$2 |
|||
shift |
|||
;; |
|||
esac |
|||
shift |
|||
done |
|||
|
|||
value=${value/;/%3B} |
|||
value=${value/\\r/%0D} |
|||
value=${value/\\n/%0A} |
|||
value=${value/]/%5D} |
|||
|
|||
local message="##vso[task.setvariable variable=$name;isSecret=$secret;isOutput=$is_multi_job_variable]$value" |
|||
|
|||
if [[ "$as_output" == true ]]; then |
|||
$message |
|||
else |
|||
echo "$message" |
|||
fi |
|||
} |
|||
|
|||
function Write-PipelinePrependPath { |
|||
local prepend_path='' |
|||
|
|||
while [[ $# -gt 0 ]]; do |
|||
opt="$(echo "${1/#--/-}" | awk '{print tolower($0)}')" |
|||
case "$opt" in |
|||
-path|-p) |
|||
prepend_path=$2 |
|||
shift |
|||
;; |
|||
esac |
|||
shift |
|||
done |
|||
|
|||
export PATH="$prepend_path:$PATH" |
|||
|
|||
if [[ "$ci" == true ]]; then |
|||
echo "##vso[task.prependpath]$prepend_path" |
|||
fi |
|||
} |
|||
@ -0,0 +1,35 @@ |
|||
param( |
|||
[Parameter(Mandatory=$true)][int] $BarBuildId, # ID of the build which assets should be downloaded |
|||
[Parameter(Mandatory=$true)][string] $DropLocation, # Where the assets should be downloaded to |
|||
[Parameter(Mandatory=$true)][string] $MaestroApiAccessToken, # Token used to access Maestro API |
|||
[Parameter(Mandatory=$false)][string] $MaestroApiEndPoint = "https://maestro-prod.westus2.cloudapp.azure.com", # Maestro API URL |
|||
[Parameter(Mandatory=$false)][string] $MaestroApiVersion = "2019-01-16" # Version of Maestro API to use |
|||
) |
|||
|
|||
. $PSScriptRoot\post-build-utils.ps1 |
|||
|
|||
try { |
|||
Write-Host "Installing DARC ..." |
|||
|
|||
. $PSScriptRoot\..\darc-init.ps1 |
|||
$exitCode = $LASTEXITCODE |
|||
|
|||
if ($exitCode -ne 0) { |
|||
Write-PipelineTaskError "Something failed while running 'darc-init.ps1'. Check for errors above. Exiting now..." |
|||
ExitWithExitCode $exitCode |
|||
} |
|||
|
|||
darc gather-drop --non-shipping ` |
|||
--continue-on-error ` |
|||
--id $BarBuildId ` |
|||
--output-dir $DropLocation ` |
|||
--bar-uri $MaestroApiEndpoint ` |
|||
--password $MaestroApiAccessToken ` |
|||
--latest-location |
|||
} |
|||
catch { |
|||
Write-Host $_ |
|||
Write-Host $_.Exception |
|||
Write-Host $_.ScriptStackTrace |
|||
ExitWithExitCode 1 |
|||
} |
|||
@ -0,0 +1,29 @@ |
|||
param ( |
|||
$dotnetsymbolVersion = $null |
|||
) |
|||
|
|||
$ErrorActionPreference = "Stop" |
|||
Set-StrictMode -Version 2.0 |
|||
|
|||
. $PSScriptRoot\..\tools.ps1 |
|||
|
|||
$verbosity = "minimal" |
|||
|
|||
function Installdotnetsymbol ($dotnetsymbolVersion) { |
|||
$dotnetsymbolPackageName = "dotnet-symbol" |
|||
|
|||
$dotnetRoot = InitializeDotNetCli -install:$true |
|||
$dotnet = "$dotnetRoot\dotnet.exe" |
|||
$toolList = & "$dotnet" tool list --global |
|||
|
|||
if (($toolList -like "*$dotnetsymbolPackageName*") -and ($toolList -like "*$dotnetsymbolVersion*")) { |
|||
Write-Host "dotnet-symbol version $dotnetsymbolVersion is already installed." |
|||
} |
|||
else { |
|||
Write-Host "Installing dotnet-symbol version $dotnetsymbolVersion..." |
|||
Write-Host "You may need to restart your command window if this is the first dotnet tool you have installed." |
|||
& "$dotnet" tool install $dotnetsymbolPackageName --version $dotnetsymbolVersion --verbosity $verbosity --global |
|||
} |
|||
} |
|||
|
|||
Installdotnetsymbol $dotnetsymbolVersion |
|||
@ -0,0 +1,25 @@ |
|||
# This script validates NuGet package metadata information using this |
|||
# tool: https://github.com/NuGet/NuGetGallery/tree/jver-verify/src/VerifyMicrosoftPackage |
|||
|
|||
param( |
|||
[Parameter(Mandatory=$true)][string] $PackagesPath, # Path to where the packages to be validated are |
|||
[Parameter(Mandatory=$true)][string] $ToolDestinationPath # Where the validation tool should be downloaded to |
|||
) |
|||
|
|||
. $PSScriptRoot\post-build-utils.ps1 |
|||
|
|||
try { |
|||
$url = "https://raw.githubusercontent.com/NuGet/NuGetGallery/jver-verify/src/VerifyMicrosoftPackage/verify.ps1" |
|||
|
|||
New-Item -ItemType "directory" -Path ${ToolDestinationPath} -Force |
|||
|
|||
Invoke-WebRequest $url -OutFile ${ToolDestinationPath}\verify.ps1 |
|||
|
|||
& ${ToolDestinationPath}\verify.ps1 ${PackagesPath}\*.nupkg |
|||
} |
|||
catch { |
|||
Write-PipelineTaskError "NuGet package validation failed. Please check error logs." |
|||
Write-Host $_ |
|||
Write-Host $_.ScriptStackTrace |
|||
ExitWithExitCode 1 |
|||
} |
|||
@ -0,0 +1,90 @@ |
|||
# Most of the functions in this file require the variables `MaestroApiEndPoint`, |
|||
# `MaestroApiVersion` and `MaestroApiAccessToken` to be globally available. |
|||
|
|||
$ErrorActionPreference = "Stop" |
|||
Set-StrictMode -Version 2.0 |
|||
|
|||
# `tools.ps1` checks $ci to perform some actions. Since the post-build |
|||
# scripts don't necessarily execute in the same agent that run the |
|||
# build.ps1/sh script this variable isn't automatically set. |
|||
$ci = $true |
|||
. $PSScriptRoot\..\tools.ps1 |
|||
|
|||
function Create-MaestroApiRequestHeaders([string]$ContentType = "application/json") { |
|||
Validate-MaestroVars |
|||
|
|||
$headers = New-Object 'System.Collections.Generic.Dictionary[[String],[String]]' |
|||
$headers.Add('Accept', $ContentType) |
|||
$headers.Add('Authorization',"Bearer $MaestroApiAccessToken") |
|||
return $headers |
|||
} |
|||
|
|||
function Get-MaestroChannel([int]$ChannelId) { |
|||
Validate-MaestroVars |
|||
|
|||
$apiHeaders = Create-MaestroApiRequestHeaders |
|||
$apiEndpoint = "$MaestroApiEndPoint/api/channels/${ChannelId}?api-version=$MaestroApiVersion" |
|||
|
|||
$result = try { Invoke-WebRequest -Method Get -Uri $apiEndpoint -Headers $apiHeaders | ConvertFrom-Json } catch { Write-Host "Error: $_" } |
|||
return $result |
|||
} |
|||
|
|||
function Get-MaestroBuild([int]$BuildId) { |
|||
Validate-MaestroVars |
|||
|
|||
$apiHeaders = Create-MaestroApiRequestHeaders -AuthToken $MaestroApiAccessToken |
|||
$apiEndpoint = "$MaestroApiEndPoint/api/builds/${BuildId}?api-version=$MaestroApiVersion" |
|||
|
|||
$result = try { return Invoke-WebRequest -Method Get -Uri $apiEndpoint -Headers $apiHeaders | ConvertFrom-Json } catch { Write-Host "Error: $_" } |
|||
return $result |
|||
} |
|||
|
|||
function Get-MaestroSubscriptions([string]$SourceRepository, [int]$ChannelId) { |
|||
Validate-MaestroVars |
|||
|
|||
$SourceRepository = [System.Web.HttpUtility]::UrlEncode($SourceRepository) |
|||
$apiHeaders = Create-MaestroApiRequestHeaders -AuthToken $MaestroApiAccessToken |
|||
$apiEndpoint = "$MaestroApiEndPoint/api/subscriptions?sourceRepository=$SourceRepository&channelId=$ChannelId&api-version=$MaestroApiVersion" |
|||
|
|||
$result = try { Invoke-WebRequest -Method Get -Uri $apiEndpoint -Headers $apiHeaders | ConvertFrom-Json } catch { Write-Host "Error: $_" } |
|||
return $result |
|||
} |
|||
|
|||
function Trigger-Subscription([string]$SubscriptionId) { |
|||
Validate-MaestroVars |
|||
|
|||
$apiHeaders = Create-MaestroApiRequestHeaders -AuthToken $MaestroApiAccessToken |
|||
$apiEndpoint = "$MaestroApiEndPoint/api/subscriptions/$SubscriptionId/trigger?api-version=$MaestroApiVersion" |
|||
Invoke-WebRequest -Uri $apiEndpoint -Headers $apiHeaders -Method Post | Out-Null |
|||
} |
|||
|
|||
function Assign-BuildToChannel([int]$BuildId, [int]$ChannelId) { |
|||
Validate-MaestroVars |
|||
|
|||
$apiHeaders = Create-MaestroApiRequestHeaders -AuthToken $MaestroApiAccessToken |
|||
$apiEndpoint = "$MaestroApiEndPoint/api/channels/${ChannelId}/builds/${BuildId}?api-version=$MaestroApiVersion" |
|||
Invoke-WebRequest -Method Post -Uri $apiEndpoint -Headers $apiHeaders | Out-Null |
|||
} |
|||
|
|||
function Validate-MaestroVars { |
|||
try { |
|||
Get-Variable MaestroApiEndPoint -Scope Global | Out-Null |
|||
Get-Variable MaestroApiVersion -Scope Global | Out-Null |
|||
Get-Variable MaestroApiAccessToken -Scope Global | Out-Null |
|||
|
|||
if (!($MaestroApiEndPoint -Match "^http[s]?://maestro-(int|prod).westus2.cloudapp.azure.com$")) { |
|||
Write-PipelineTaskError "MaestroApiEndPoint is not a valid Maestro URL. '$MaestroApiEndPoint'" |
|||
ExitWithExitCode 1 |
|||
} |
|||
|
|||
if (!($MaestroApiVersion -Match "^[0-9]{4}-[0-9]{2}-[0-9]{2}$")) { |
|||
Write-PipelineTaskError "MaestroApiVersion does not match a version string in the format yyyy-MM-DD. '$MaestroApiVersion'" |
|||
ExitWithExitCode 1 |
|||
} |
|||
} |
|||
catch { |
|||
Write-PipelineTaskError "Error: Variables `MaestroApiEndPoint`, `MaestroApiVersion` and `MaestroApiAccessToken` are required while using this script." |
|||
Write-Host $_ |
|||
ExitWithExitCode 1 |
|||
} |
|||
} |
|||
@ -0,0 +1,48 @@ |
|||
param( |
|||
[Parameter(Mandatory=$true)][int] $BuildId, |
|||
[Parameter(Mandatory=$true)][int] $ChannelId, |
|||
[Parameter(Mandatory=$true)][string] $MaestroApiAccessToken, |
|||
[Parameter(Mandatory=$false)][string] $MaestroApiEndPoint = "https://maestro-prod.westus2.cloudapp.azure.com", |
|||
[Parameter(Mandatory=$false)][string] $MaestroApiVersion = "2019-01-16" |
|||
) |
|||
|
|||
. $PSScriptRoot\post-build-utils.ps1 |
|||
|
|||
try { |
|||
# Check that the channel we are going to promote the build to exist |
|||
$channelInfo = Get-MaestroChannel -ChannelId $ChannelId |
|||
|
|||
if (!$channelInfo) { |
|||
Write-Host "Channel with BAR ID $ChannelId was not found in BAR!" |
|||
ExitWithExitCode 1 |
|||
} |
|||
|
|||
# Get info about which channels the build has already been promoted to |
|||
$buildInfo = Get-MaestroBuild -BuildId $BuildId |
|||
|
|||
if (!$buildInfo) { |
|||
Write-Host "Build with BAR ID $BuildId was not found in BAR!" |
|||
ExitWithExitCode 1 |
|||
} |
|||
|
|||
# Find whether the build is already assigned to the channel or not |
|||
if ($buildInfo.channels) { |
|||
foreach ($channel in $buildInfo.channels) { |
|||
if ($channel.Id -eq $ChannelId) { |
|||
Write-Host "The build with BAR ID $BuildId is already on channel $ChannelId!" |
|||
ExitWithExitCode 0 |
|||
} |
|||
} |
|||
} |
|||
|
|||
Write-Host "Promoting build '$BuildId' to channel '$ChannelId'." |
|||
|
|||
Assign-BuildToChannel -BuildId $BuildId -ChannelId $ChannelId |
|||
|
|||
Write-Host "done." |
|||
} |
|||
catch { |
|||
Write-Host "There was an error while trying to promote build '$BuildId' to channel '$ChannelId'" |
|||
Write-Host $_ |
|||
Write-Host $_.ScriptStackTrace |
|||
} |
|||
@ -0,0 +1,26 @@ |
|||
param( |
|||
[Parameter(Mandatory=$true)][string] $ReleaseConfigsPath # Full path to ReleaseConfigs.txt asset |
|||
) |
|||
|
|||
. $PSScriptRoot\post-build-utils.ps1 |
|||
|
|||
try { |
|||
$Content = Get-Content $ReleaseConfigsPath |
|||
|
|||
$BarId = $Content | Select -Index 0 |
|||
|
|||
$Channels = "" |
|||
$Content | Select -Index 1 | ForEach-Object { $Channels += "$_ ," } |
|||
|
|||
$IsStableBuild = $Content | Select -Index 2 |
|||
|
|||
Write-PipelineSetVariable -Name 'BARBuildId' -Value $BarId |
|||
Write-PipelineSetVariable -Name 'InitialChannels' -Value "$Channels" |
|||
Write-PipelineSetVariable -Name 'IsStableBuild' -Value $IsStableBuild |
|||
} |
|||
catch { |
|||
Write-Host $_ |
|||
Write-Host $_.Exception |
|||
Write-Host $_.ScriptStackTrace |
|||
ExitWithExitCode 1 |
|||
} |
|||
@ -0,0 +1,29 @@ |
|||
param ( |
|||
$sourcelinkCliVersion = $null |
|||
) |
|||
|
|||
$ErrorActionPreference = "Stop" |
|||
Set-StrictMode -Version 2.0 |
|||
|
|||
. $PSScriptRoot\..\tools.ps1 |
|||
|
|||
$verbosity = "minimal" |
|||
|
|||
function InstallSourcelinkCli ($sourcelinkCliVersion) { |
|||
$sourcelinkCliPackageName = "sourcelink" |
|||
|
|||
$dotnetRoot = InitializeDotNetCli -install:$true |
|||
$dotnet = "$dotnetRoot\dotnet.exe" |
|||
$toolList = & "$dotnet" tool list --global |
|||
|
|||
if (($toolList -like "*$sourcelinkCliPackageName*") -and ($toolList -like "*$sourcelinkCliVersion*")) { |
|||
Write-Host "SourceLink CLI version $sourcelinkCliVersion is already installed." |
|||
} |
|||
else { |
|||
Write-Host "Installing SourceLink CLI version $sourcelinkCliVersion..." |
|||
Write-Host "You may need to restart your command window if this is the first dotnet tool you have installed." |
|||
& "$dotnet" tool install $sourcelinkCliPackageName --version $sourcelinkCliVersion --verbosity $verbosity --global |
|||
} |
|||
} |
|||
|
|||
InstallSourcelinkCli $sourcelinkCliVersion |
|||
@ -0,0 +1,227 @@ |
|||
param( |
|||
[Parameter(Mandatory=$true)][string] $InputPath, # Full path to directory where Symbols.NuGet packages to be checked are stored |
|||
[Parameter(Mandatory=$true)][string] $ExtractPath, # Full path to directory where the packages will be extracted during validation |
|||
[Parameter(Mandatory=$true)][string] $GHRepoName, # GitHub name of the repo including the Org. E.g., dotnet/arcade |
|||
[Parameter(Mandatory=$true)][string] $GHCommit, # GitHub commit SHA used to build the packages |
|||
[Parameter(Mandatory=$true)][string] $SourcelinkCliVersion # Version of SourceLink CLI to use |
|||
) |
|||
|
|||
. $PSScriptRoot\post-build-utils.ps1 |
|||
|
|||
# Cache/HashMap (File -> Exist flag) used to consult whether a file exist |
|||
# in the repository at a specific commit point. This is populated by inserting |
|||
# all files present in the repo at a specific commit point. |
|||
$global:RepoFiles = @{} |
|||
|
|||
$ValidatePackage = { |
|||
param( |
|||
[string] $PackagePath # Full path to a Symbols.NuGet package |
|||
) |
|||
|
|||
. $using:PSScriptRoot\..\tools.ps1 |
|||
|
|||
# Ensure input file exist |
|||
if (!(Test-Path $PackagePath)) { |
|||
Write-PipelineTaskError "Input file does not exist: $PackagePath" |
|||
ExitWithExitCode 1 |
|||
} |
|||
|
|||
# Extensions for which we'll look for SourceLink information |
|||
# For now we'll only care about Portable & Embedded PDBs |
|||
$RelevantExtensions = @(".dll", ".exe", ".pdb") |
|||
|
|||
Write-Host -NoNewLine "Validating" ([System.IO.Path]::GetFileName($PackagePath)) "... " |
|||
|
|||
$PackageId = [System.IO.Path]::GetFileNameWithoutExtension($PackagePath) |
|||
$ExtractPath = Join-Path -Path $using:ExtractPath -ChildPath $PackageId |
|||
$FailedFiles = 0 |
|||
|
|||
Add-Type -AssemblyName System.IO.Compression.FileSystem |
|||
|
|||
[System.IO.Directory]::CreateDirectory($ExtractPath); |
|||
|
|||
try { |
|||
$zip = [System.IO.Compression.ZipFile]::OpenRead($PackagePath) |
|||
|
|||
$zip.Entries | |
|||
Where-Object {$RelevantExtensions -contains [System.IO.Path]::GetExtension($_.Name)} | |
|||
ForEach-Object { |
|||
$FileName = $_.FullName |
|||
$Extension = [System.IO.Path]::GetExtension($_.Name) |
|||
$FakeName = -Join((New-Guid), $Extension) |
|||
$TargetFile = Join-Path -Path $ExtractPath -ChildPath $FakeName |
|||
|
|||
# We ignore resource DLLs |
|||
if ($FileName.EndsWith(".resources.dll")) { |
|||
return |
|||
} |
|||
|
|||
[System.IO.Compression.ZipFileExtensions]::ExtractToFile($_, $TargetFile, $true) |
|||
|
|||
$ValidateFile = { |
|||
param( |
|||
[string] $FullPath, # Full path to the module that has to be checked |
|||
[string] $RealPath, |
|||
[ref] $FailedFiles |
|||
) |
|||
|
|||
$sourcelinkExe = "$env:USERPROFILE\.dotnet\tools" |
|||
$sourcelinkExe = Resolve-Path "$sourcelinkExe\sourcelink.exe" |
|||
$SourceLinkInfos = & $sourcelinkExe print-urls $FullPath | Out-String |
|||
|
|||
if ($LASTEXITCODE -eq 0 -and -not ([string]::IsNullOrEmpty($SourceLinkInfos))) { |
|||
$NumFailedLinks = 0 |
|||
|
|||
# We only care about Http addresses |
|||
$Matches = (Select-String '(http[s]?)(:\/\/)([^\s,]+)' -Input $SourceLinkInfos -AllMatches).Matches |
|||
|
|||
if ($Matches.Count -ne 0) { |
|||
$Matches.Value | |
|||
ForEach-Object { |
|||
$Link = $_ |
|||
$CommitUrl = "https://raw.githubusercontent.com/${using:GHRepoName}/${using:GHCommit}/" |
|||
|
|||
$FilePath = $Link.Replace($CommitUrl, "") |
|||
$Status = 200 |
|||
$Cache = $using:RepoFiles |
|||
|
|||
if ( !($Cache.ContainsKey($FilePath)) ) { |
|||
try { |
|||
$Uri = $Link -as [System.URI] |
|||
|
|||
# Only GitHub links are valid |
|||
if ($Uri.AbsoluteURI -ne $null -and ($Uri.Host -match "github" -or $Uri.Host -match "githubusercontent")) { |
|||
$Status = (Invoke-WebRequest -Uri $Link -UseBasicParsing -Method HEAD -TimeoutSec 5).StatusCode |
|||
} |
|||
else { |
|||
$Status = 0 |
|||
} |
|||
} |
|||
catch { |
|||
write-host $_ |
|||
$Status = 0 |
|||
} |
|||
} |
|||
|
|||
if ($Status -ne 200) { |
|||
if ($NumFailedLinks -eq 0) { |
|||
if ($FailedFiles.Value -eq 0) { |
|||
Write-Host |
|||
} |
|||
|
|||
Write-Host "`tFile $RealPath has broken links:" |
|||
} |
|||
|
|||
Write-Host "`t`tFailed to retrieve $Link" |
|||
|
|||
$NumFailedLinks++ |
|||
} |
|||
} |
|||
} |
|||
|
|||
if ($NumFailedLinks -ne 0) { |
|||
$FailedFiles.value++ |
|||
$global:LASTEXITCODE = 1 |
|||
} |
|||
} |
|||
} |
|||
|
|||
&$ValidateFile $TargetFile $FileName ([ref]$FailedFiles) |
|||
} |
|||
} |
|||
catch { |
|||
|
|||
} |
|||
finally { |
|||
$zip.Dispose() |
|||
} |
|||
|
|||
if ($FailedFiles -eq 0) { |
|||
Write-Host "Passed." |
|||
} |
|||
else { |
|||
Write-PipelineTaskError "$PackagePath has broken SourceLink links." |
|||
} |
|||
} |
|||
|
|||
function ValidateSourceLinkLinks { |
|||
if (!($GHRepoName -Match "^[^\s\/]+/[^\s\/]+$")) { |
|||
if (!($GHRepoName -Match "^[^\s-]+-[^\s]+$")) { |
|||
Write-PipelineTaskError "GHRepoName should be in the format <org>/<repo> or <org>-<repo>" |
|||
ExitWithExitCode 1 |
|||
} |
|||
else { |
|||
$GHRepoName = $GHRepoName -replace '^([^\s-]+)-([^\s]+)$', '$1/$2'; |
|||
} |
|||
} |
|||
|
|||
if (!($GHCommit -Match "^[0-9a-fA-F]{40}$")) { |
|||
Write-PipelineTaskError "GHCommit should be a 40 chars hexadecimal string" |
|||
ExitWithExitCode 1 |
|||
} |
|||
|
|||
$RepoTreeURL = -Join("http://api.github.com/repos/", $GHRepoName, "/git/trees/", $GHCommit, "?recursive=1") |
|||
$CodeExtensions = @(".cs", ".vb", ".fs", ".fsi", ".fsx", ".fsscript") |
|||
|
|||
try { |
|||
# Retrieve the list of files in the repo at that particular commit point and store them in the RepoFiles hash |
|||
$Data = Invoke-WebRequest $RepoTreeURL -UseBasicParsing | ConvertFrom-Json | Select-Object -ExpandProperty tree |
|||
|
|||
foreach ($file in $Data) { |
|||
$Extension = [System.IO.Path]::GetExtension($file.path) |
|||
|
|||
if ($CodeExtensions.Contains($Extension)) { |
|||
$RepoFiles[$file.path] = 1 |
|||
} |
|||
} |
|||
} |
|||
catch { |
|||
Write-PipelineTaskError "Problems downloading the list of files from the repo. Url used: $RepoTreeURL" |
|||
Write-Host $_ |
|||
ExitWithExitCode 1 |
|||
} |
|||
|
|||
if (Test-Path $ExtractPath) { |
|||
Remove-Item $ExtractPath -Force -Recurse -ErrorAction SilentlyContinue |
|||
} |
|||
|
|||
# Process each NuGet package in parallel |
|||
$Jobs = @() |
|||
Get-ChildItem "$InputPath\*.symbols.nupkg" | |
|||
ForEach-Object { |
|||
$Jobs += Start-Job -ScriptBlock $ValidatePackage -ArgumentList $_.FullName |
|||
} |
|||
|
|||
foreach ($Job in $Jobs) { |
|||
Wait-Job -Id $Job.Id | Receive-Job |
|||
} |
|||
} |
|||
|
|||
function InstallSourcelinkCli { |
|||
$sourcelinkCliPackageName = "sourcelink" |
|||
|
|||
$dotnetRoot = InitializeDotNetCli -install:$true |
|||
$dotnet = "$dotnetRoot\dotnet.exe" |
|||
$toolList = & "$dotnet" tool list --global |
|||
|
|||
if (($toolList -like "*$sourcelinkCliPackageName*") -and ($toolList -like "*$sourcelinkCliVersion*")) { |
|||
Write-Host "SourceLink CLI version $sourcelinkCliVersion is already installed." |
|||
} |
|||
else { |
|||
Write-Host "Installing SourceLink CLI version $sourcelinkCliVersion..." |
|||
Write-Host "You may need to restart your command window if this is the first dotnet tool you have installed." |
|||
& "$dotnet" tool install $sourcelinkCliPackageName --version $sourcelinkCliVersion --verbosity "minimal" --global |
|||
} |
|||
} |
|||
|
|||
try { |
|||
InstallSourcelinkCli |
|||
|
|||
ValidateSourceLinkLinks |
|||
} |
|||
catch { |
|||
Write-Host $_ |
|||
Write-Host $_.Exception |
|||
Write-Host $_.ScriptStackTrace |
|||
ExitWithExitCode 1 |
|||
} |
|||
@ -0,0 +1,189 @@ |
|||
param( |
|||
[Parameter(Mandatory=$true)][string] $InputPath, # Full path to directory where NuGet packages to be checked are stored |
|||
[Parameter(Mandatory=$true)][string] $ExtractPath, # Full path to directory where the packages will be extracted during validation |
|||
[Parameter(Mandatory=$true)][string] $DotnetSymbolVersion # Version of dotnet symbol to use |
|||
) |
|||
|
|||
. $PSScriptRoot\post-build-utils.ps1 |
|||
|
|||
Add-Type -AssemblyName System.IO.Compression.FileSystem |
|||
|
|||
function FirstMatchingSymbolDescriptionOrDefault { |
|||
param( |
|||
[string] $FullPath, # Full path to the module that has to be checked |
|||
[string] $TargetServerParam, # Parameter to pass to `Symbol Tool` indicating the server to lookup for symbols |
|||
[string] $SymbolsPath |
|||
) |
|||
|
|||
$FileName = [System.IO.Path]::GetFileName($FullPath) |
|||
$Extension = [System.IO.Path]::GetExtension($FullPath) |
|||
|
|||
# Those below are potential symbol files that the `dotnet symbol` might |
|||
# return. Which one will be returned depend on the type of file we are |
|||
# checking and which type of file was uploaded. |
|||
|
|||
# The file itself is returned |
|||
$SymbolPath = $SymbolsPath + "\" + $FileName |
|||
|
|||
# PDB file for the module |
|||
$PdbPath = $SymbolPath.Replace($Extension, ".pdb") |
|||
|
|||
# PDB file for R2R module (created by crossgen) |
|||
$NGenPdb = $SymbolPath.Replace($Extension, ".ni.pdb") |
|||
|
|||
# DBG file for a .so library |
|||
$SODbg = $SymbolPath.Replace($Extension, ".so.dbg") |
|||
|
|||
# DWARF file for a .dylib |
|||
$DylibDwarf = $SymbolPath.Replace($Extension, ".dylib.dwarf") |
|||
|
|||
$dotnetsymbolExe = "$env:USERPROFILE\.dotnet\tools" |
|||
$dotnetsymbolExe = Resolve-Path "$dotnetsymbolExe\dotnet-symbol.exe" |
|||
|
|||
& $dotnetsymbolExe --symbols --modules --windows-pdbs $TargetServerParam $FullPath -o $SymbolsPath | Out-Null |
|||
|
|||
if (Test-Path $PdbPath) { |
|||
return "PDB" |
|||
} |
|||
elseif (Test-Path $NGenPdb) { |
|||
return "NGen PDB" |
|||
} |
|||
elseif (Test-Path $SODbg) { |
|||
return "DBG for SO" |
|||
} |
|||
elseif (Test-Path $DylibDwarf) { |
|||
return "Dwarf for Dylib" |
|||
} |
|||
elseif (Test-Path $SymbolPath) { |
|||
return "Module" |
|||
} |
|||
else { |
|||
return $null |
|||
} |
|||
} |
|||
|
|||
function CountMissingSymbols { |
|||
param( |
|||
[string] $PackagePath # Path to a NuGet package |
|||
) |
|||
|
|||
# Ensure input file exist |
|||
if (!(Test-Path $PackagePath)) { |
|||
Write-PipelineTaskError "Input file does not exist: $PackagePath" |
|||
ExitWithExitCode 1 |
|||
} |
|||
|
|||
# Extensions for which we'll look for symbols |
|||
$RelevantExtensions = @(".dll", ".exe", ".so", ".dylib") |
|||
|
|||
# How many files are missing symbol information |
|||
$MissingSymbols = 0 |
|||
|
|||
$PackageId = [System.IO.Path]::GetFileNameWithoutExtension($PackagePath) |
|||
$PackageGuid = New-Guid |
|||
$ExtractPath = Join-Path -Path $ExtractPath -ChildPath $PackageGuid |
|||
$SymbolsPath = Join-Path -Path $ExtractPath -ChildPath "Symbols" |
|||
|
|||
[System.IO.Compression.ZipFile]::ExtractToDirectory($PackagePath, $ExtractPath) |
|||
|
|||
Get-ChildItem -Recurse $ExtractPath | |
|||
Where-Object {$RelevantExtensions -contains $_.Extension} | |
|||
ForEach-Object { |
|||
if ($_.FullName -Match "\\ref\\") { |
|||
Write-Host "`t Ignoring reference assembly file" $_.FullName |
|||
return |
|||
} |
|||
|
|||
$SymbolsOnMSDL = FirstMatchingSymbolDescriptionOrDefault $_.FullName "--microsoft-symbol-server" $SymbolsPath |
|||
$SymbolsOnSymWeb = FirstMatchingSymbolDescriptionOrDefault $_.FullName "--internal-server" $SymbolsPath |
|||
|
|||
Write-Host -NoNewLine "`t Checking file" $_.FullName "... " |
|||
|
|||
if ($SymbolsOnMSDL -ne $null -and $SymbolsOnSymWeb -ne $null) { |
|||
Write-Host "Symbols found on MSDL (" $SymbolsOnMSDL ") and SymWeb (" $SymbolsOnSymWeb ")" |
|||
} |
|||
else { |
|||
$MissingSymbols++ |
|||
|
|||
if ($SymbolsOnMSDL -eq $null -and $SymbolsOnSymWeb -eq $null) { |
|||
Write-Host "No symbols found on MSDL or SymWeb!" |
|||
} |
|||
else { |
|||
if ($SymbolsOnMSDL -eq $null) { |
|||
Write-Host "No symbols found on MSDL!" |
|||
} |
|||
else { |
|||
Write-Host "No symbols found on SymWeb!" |
|||
} |
|||
} |
|||
} |
|||
} |
|||
|
|||
Pop-Location |
|||
|
|||
return $MissingSymbols |
|||
} |
|||
|
|||
function CheckSymbolsAvailable { |
|||
if (Test-Path $ExtractPath) { |
|||
Remove-Item $ExtractPath -Force -Recurse -ErrorAction SilentlyContinue |
|||
} |
|||
|
|||
Get-ChildItem "$InputPath\*.nupkg" | |
|||
ForEach-Object { |
|||
$FileName = $_.Name |
|||
|
|||
# These packages from Arcade-Services include some native libraries that |
|||
# our current symbol uploader can't handle. Below is a workaround until |
|||
# we get issue: https://github.com/dotnet/arcade/issues/2457 sorted. |
|||
if ($FileName -Match "Microsoft\.DotNet\.Darc\.") { |
|||
Write-Host "Ignoring Arcade-services file: $FileName" |
|||
Write-Host |
|||
return |
|||
} |
|||
elseif ($FileName -Match "Microsoft\.DotNet\.Maestro\.Tasks\.") { |
|||
Write-Host "Ignoring Arcade-services file: $FileName" |
|||
Write-Host |
|||
return |
|||
} |
|||
|
|||
Write-Host "Validating $FileName " |
|||
$Status = CountMissingSymbols "$InputPath\$FileName" |
|||
|
|||
if ($Status -ne 0) { |
|||
Write-PipelineTaskError "Missing symbols for $Status modules in the package $FileName" |
|||
ExitWithExitCode $exitCode |
|||
} |
|||
|
|||
Write-Host |
|||
} |
|||
} |
|||
|
|||
function Installdotnetsymbol { |
|||
$dotnetsymbolPackageName = "dotnet-symbol" |
|||
|
|||
$dotnetRoot = InitializeDotNetCli -install:$true |
|||
$dotnet = "$dotnetRoot\dotnet.exe" |
|||
$toolList = & "$dotnet" tool list --global |
|||
|
|||
if (($toolList -like "*$dotnetsymbolPackageName*") -and ($toolList -like "*$dotnetsymbolVersion*")) { |
|||
Write-Host "dotnet-symbol version $dotnetsymbolVersion is already installed." |
|||
} |
|||
else { |
|||
Write-Host "Installing dotnet-symbol version $dotnetsymbolVersion..." |
|||
Write-Host "You may need to restart your command window if this is the first dotnet tool you have installed." |
|||
& "$dotnet" tool install $dotnetsymbolPackageName --version $dotnetsymbolVersion --verbosity "minimal" --global |
|||
} |
|||
} |
|||
|
|||
try { |
|||
Installdotnetsymbol |
|||
|
|||
CheckSymbolsAvailable |
|||
} |
|||
catch { |
|||
Write-Host $_ |
|||
Write-Host $_.Exception |
|||
Write-Host $_.ScriptStackTrace |
|||
ExitWithExitCode 1 |
|||
} |
|||
@ -0,0 +1,57 @@ |
|||
param( |
|||
[Parameter(Mandatory=$true)][string] $SourceRepo, |
|||
[Parameter(Mandatory=$true)][int] $ChannelId, |
|||
[Parameter(Mandatory=$true)][string] $MaestroApiAccessToken, |
|||
[Parameter(Mandatory=$false)][string] $MaestroApiEndPoint = "https://maestro-prod.westus2.cloudapp.azure.com", |
|||
[Parameter(Mandatory=$false)][string] $MaestroApiVersion = "2019-01-16" |
|||
) |
|||
|
|||
. $PSScriptRoot\post-build-utils.ps1 |
|||
|
|||
# Get all the $SourceRepo subscriptions |
|||
$normalizedSourceRepo = $SourceRepo.Replace('dnceng@', '') |
|||
$subscriptions = Get-MaestroSubscriptions -SourceRepository $normalizedSourceRepo -ChannelId $ChannelId |
|||
|
|||
if (!$subscriptions) { |
|||
Write-Host "No subscriptions found for source repo '$normalizedSourceRepo' in channel '$ChannelId'" |
|||
ExitWithExitCode 0 |
|||
} |
|||
|
|||
$subscriptionsToTrigger = New-Object System.Collections.Generic.List[string] |
|||
$failedTriggeredSubscription = $false |
|||
|
|||
# Get all enabled subscriptions that need dependency flow on 'everyBuild' |
|||
foreach ($subscription in $subscriptions) { |
|||
if ($subscription.enabled -and $subscription.policy.updateFrequency -like 'everyBuild' -and $subscription.channel.id -eq $ChannelId) { |
|||
Write-Host "Should trigger this subscription: $subscription.id" |
|||
[void]$subscriptionsToTrigger.Add($subscription.id) |
|||
} |
|||
} |
|||
|
|||
foreach ($subscriptionToTrigger in $subscriptionsToTrigger) { |
|||
try { |
|||
Write-Host "Triggering subscription '$subscriptionToTrigger'." |
|||
|
|||
Trigger-Subscription -SubscriptionId $subscriptionToTrigger |
|||
|
|||
Write-Host "done." |
|||
} |
|||
catch |
|||
{ |
|||
Write-Host "There was an error while triggering subscription '$subscriptionToTrigger'" |
|||
Write-Host $_ |
|||
Write-Host $_.ScriptStackTrace |
|||
$failedTriggeredSubscription = $true |
|||
} |
|||
} |
|||
|
|||
if ($subscriptionsToTrigger.Count -eq 0) { |
|||
Write-Host "No subscription matched source repo '$normalizedSourceRepo' and channel ID '$ChannelId'." |
|||
} |
|||
elseif ($failedTriggeredSubscription) { |
|||
Write-Host "At least one subscription failed to be triggered..." |
|||
ExitWithExitCode 1 |
|||
} |
|||
else { |
|||
Write-Host "All subscriptions were triggered successfully!" |
|||
} |
|||
@ -0,0 +1,79 @@ |
|||
[CmdletBinding(PositionalBinding=$false)] |
|||
Param( |
|||
[string] $configuration = "Debug", |
|||
[string] $task, |
|||
[string] $verbosity = "minimal", |
|||
[string] $msbuildEngine = $null, |
|||
[switch] $restore, |
|||
[switch] $prepareMachine, |
|||
[switch] $help, |
|||
[Parameter(ValueFromRemainingArguments=$true)][String[]]$properties |
|||
) |
|||
|
|||
$ci = $true |
|||
$binaryLog = $true |
|||
$warnAsError = $true |
|||
|
|||
. $PSScriptRoot\tools.ps1 |
|||
|
|||
function Print-Usage() { |
|||
Write-Host "Common settings:" |
|||
Write-Host " -task <value> Name of Arcade task (name of a project in SdkTasks directory of the Arcade SDK package)" |
|||
Write-Host " -restore Restore dependencies" |
|||
Write-Host " -verbosity <value> Msbuild verbosity: q[uiet], m[inimal], n[ormal], d[etailed], and diag[nostic]" |
|||
Write-Host " -help Print help and exit" |
|||
Write-Host "" |
|||
|
|||
Write-Host "Advanced settings:" |
|||
Write-Host " -prepareMachine Prepare machine for CI run" |
|||
Write-Host " -msbuildEngine <value> Msbuild engine to use to run build ('dotnet', 'vs', or unspecified)." |
|||
Write-Host "" |
|||
Write-Host "Command line arguments not listed above are passed thru to msbuild." |
|||
} |
|||
|
|||
function Build([string]$target) { |
|||
$logSuffix = if ($target -eq "Execute") { "" } else { ".$target" } |
|||
$log = Join-Path $LogDir "$task$logSuffix.binlog" |
|||
$outputPath = Join-Path $ToolsetDir "$task\\" |
|||
|
|||
MSBuild $taskProject ` |
|||
/bl:$log ` |
|||
/t:$target ` |
|||
/p:Configuration=$configuration ` |
|||
/p:RepoRoot=$RepoRoot ` |
|||
/p:BaseIntermediateOutputPath=$outputPath ` |
|||
@properties |
|||
} |
|||
|
|||
try { |
|||
if ($help -or (($null -ne $properties) -and ($properties.Contains("/help") -or $properties.Contains("/?")))) { |
|||
Print-Usage |
|||
exit 0 |
|||
} |
|||
|
|||
if ($task -eq "") { |
|||
Write-Host "Missing required parameter '-task <value>'" -ForegroundColor Red |
|||
Print-Usage |
|||
ExitWithExitCode 1 |
|||
} |
|||
|
|||
$taskProject = GetSdkTaskProject $task |
|||
if (!(Test-Path $taskProject)) { |
|||
Write-Host "Unknown task: $task" -ForegroundColor Red |
|||
ExitWithExitCode 1 |
|||
} |
|||
|
|||
if ($restore) { |
|||
Build "Restore" |
|||
} |
|||
|
|||
Build "Execute" |
|||
} |
|||
catch { |
|||
Write-Host $_ |
|||
Write-Host $_.Exception |
|||
Write-Host $_.ScriptStackTrace |
|||
ExitWithExitCode 1 |
|||
} |
|||
|
|||
ExitWithExitCode 0 |
|||
@ -0,0 +1,13 @@ |
|||
<?xml version="1.0" encoding="utf-8"?> |
|||
<configuration> |
|||
<solution> |
|||
<add key="disableSourceControlIntegration" value="true" /> |
|||
</solution> |
|||
<packageSources> |
|||
<clear /> |
|||
<add key="guardian" value="https://securitytools.pkgs.visualstudio.com/_packaging/Guardian/nuget/v3/index.json" /> |
|||
</packageSources> |
|||
<disabledPackageSources> |
|||
<clear /> |
|||
</disabledPackageSources> |
|||
</configuration> |
|||
@ -0,0 +1,99 @@ |
|||
Param( |
|||
[string] $GuardianPackageName, # Required: the name of guardian CLI package (not needed if GuardianCliLocation is specified) |
|||
[string] $NugetPackageDirectory, # Required: directory where NuGet packages are installed (not needed if GuardianCliLocation is specified) |
|||
[string] $GuardianCliLocation, # Optional: Direct location of Guardian CLI executable if GuardianPackageName & NugetPackageDirectory are not specified |
|||
[string] $Repository=$env:BUILD_REPOSITORY_NAME, # Required: the name of the repository (e.g. dotnet/arcade) |
|||
[string] $BranchName=$env:BUILD_SOURCEBRANCH, # Optional: name of branch or version of gdn settings; defaults to master |
|||
[string] $SourceDirectory=$env:BUILD_SOURCESDIRECTORY, # Required: the directory where source files are located |
|||
[string] $ArtifactsDirectory = (Join-Path $env:BUILD_SOURCESDIRECTORY ("artifacts")), # Required: the directory where build artifacts are located |
|||
[string] $AzureDevOpsAccessToken, # Required: access token for dnceng; should be provided via KeyVault |
|||
[string[]] $SourceToolsList, # Optional: list of SDL tools to run on source code |
|||
[string[]] $ArtifactToolsList, # Optional: list of SDL tools to run on built artifacts |
|||
[bool] $TsaPublish=$False, # Optional: true will publish results to TSA; only set to true after onboarding to TSA; TSA is the automated framework used to upload test results as bugs. |
|||
[string] $TsaBranchName=$env:BUILD_SOURCEBRANCH, # Optional: required for TSA publish; defaults to $(Build.SourceBranchName); TSA is the automated framework used to upload test results as bugs. |
|||
[string] $TsaRepositoryName=$env:BUILD_REPOSITORY_NAME, # Optional: TSA repository name; will be generated automatically if not submitted; TSA is the automated framework used to upload test results as bugs. |
|||
[string] $BuildNumber=$env:BUILD_BUILDNUMBER, # Optional: required for TSA publish; defaults to $(Build.BuildNumber) |
|||
[bool] $UpdateBaseline=$False, # Optional: if true, will update the baseline in the repository; should only be run after fixing any issues which need to be fixed |
|||
[bool] $TsaOnboard=$False, # Optional: if true, will onboard the repository to TSA; should only be run once; TSA is the automated framework used to upload test results as bugs. |
|||
[string] $TsaInstanceUrl, # Optional: only needed if TsaOnboard or TsaPublish is true; the instance-url registered with TSA; TSA is the automated framework used to upload test results as bugs. |
|||
[string] $TsaCodebaseName, # Optional: only needed if TsaOnboard or TsaPublish is true; the name of the codebase registered with TSA; TSA is the automated framework used to upload test results as bugs. |
|||
[string] $TsaProjectName, # Optional: only needed if TsaOnboard or TsaPublish is true; the name of the project registered with TSA; TSA is the automated framework used to upload test results as bugs. |
|||
[string] $TsaNotificationEmail, # Optional: only needed if TsaOnboard is true; the email(s) which will receive notifications of TSA bug filings (e.g. alias@microsoft.com); TSA is the automated framework used to upload test results as bugs. |
|||
[string] $TsaCodebaseAdmin, # Optional: only needed if TsaOnboard is true; the aliases which are admins of the TSA codebase (e.g. DOMAIN\alias); TSA is the automated framework used to upload test results as bugs. |
|||
[string] $TsaBugAreaPath, # Optional: only needed if TsaOnboard is true; the area path where TSA will file bugs in AzDO; TSA is the automated framework used to upload test results as bugs. |
|||
[string] $TsaIterationPath, # Optional: only needed if TsaOnboard is true; the iteration path where TSA will file bugs in AzDO; TSA is the automated framework used to upload test results as bugs. |
|||
[string] $GuardianLoggerLevel="Standard", # Optional: the logger level for the Guardian CLI; options are Trace, Verbose, Standard, Warning, and Error |
|||
[string[]] $CrScanAdditionalRunConfigParams, # Optional: Additional Params to custom build a CredScan run config in the format @("xyz:abc","sdf:1") |
|||
[string[]] $PoliCheckAdditionalRunConfigParams # Optional: Additional Params to custom build a Policheck run config in the format @("xyz:abc","sdf:1") |
|||
) |
|||
|
|||
$ErrorActionPreference = "Stop" |
|||
Set-StrictMode -Version 2.0 |
|||
$LASTEXITCODE = 0 |
|||
|
|||
#Replace repo names to the format of org/repo |
|||
if (!($Repository.contains('/'))) { |
|||
$RepoName = $Repository -replace '(.*?)-(.*)', '$1/$2'; |
|||
} |
|||
else{ |
|||
$RepoName = $Repository; |
|||
} |
|||
|
|||
if ($GuardianPackageName) { |
|||
$guardianCliLocation = Join-Path $NugetPackageDirectory (Join-Path $GuardianPackageName (Join-Path "tools" "guardian.cmd")) |
|||
} else { |
|||
$guardianCliLocation = $GuardianCliLocation |
|||
} |
|||
|
|||
$ValidPath = Test-Path $guardianCliLocation |
|||
|
|||
if ($ValidPath -eq $False) |
|||
{ |
|||
Write-Host "Invalid Guardian CLI Location." |
|||
exit 1 |
|||
} |
|||
|
|||
& $(Join-Path $PSScriptRoot "init-sdl.ps1") -GuardianCliLocation $guardianCliLocation -Repository $RepoName -BranchName $BranchName -WorkingDirectory $ArtifactsDirectory -AzureDevOpsAccessToken $AzureDevOpsAccessToken -GuardianLoggerLevel $GuardianLoggerLevel |
|||
$gdnFolder = Join-Path $ArtifactsDirectory ".gdn" |
|||
|
|||
if ($TsaOnboard) { |
|||
if ($TsaCodebaseName -and $TsaNotificationEmail -and $TsaCodebaseAdmin -and $TsaBugAreaPath) { |
|||
Write-Host "$guardianCliLocation tsa-onboard --codebase-name `"$TsaCodebaseName`" --notification-alias `"$TsaNotificationEmail`" --codebase-admin `"$TsaCodebaseAdmin`" --instance-url `"$TsaInstanceUrl`" --project-name `"$TsaProjectName`" --area-path `"$TsaBugAreaPath`" --iteration-path `"$TsaIterationPath`" --working-directory $ArtifactsDirectory --logger-level $GuardianLoggerLevel" |
|||
& $guardianCliLocation tsa-onboard --codebase-name "$TsaCodebaseName" --notification-alias "$TsaNotificationEmail" --codebase-admin "$TsaCodebaseAdmin" --instance-url "$TsaInstanceUrl" --project-name "$TsaProjectName" --area-path "$TsaBugAreaPath" --iteration-path "$TsaIterationPath" --working-directory $ArtifactsDirectory --logger-level $GuardianLoggerLevel |
|||
if ($LASTEXITCODE -ne 0) { |
|||
Write-Host "Guardian tsa-onboard failed with exit code $LASTEXITCODE." |
|||
exit $LASTEXITCODE |
|||
} |
|||
} else { |
|||
Write-Host "Could not onboard to TSA -- not all required values ($$TsaCodebaseName, $$TsaNotificationEmail, $$TsaCodebaseAdmin, $$TsaBugAreaPath) were specified." |
|||
exit 1 |
|||
} |
|||
} |
|||
|
|||
if ($ArtifactToolsList -and $ArtifactToolsList.Count -gt 0) { |
|||
& $(Join-Path $PSScriptRoot "run-sdl.ps1") -GuardianCliLocation $guardianCliLocation -WorkingDirectory $ArtifactsDirectory -TargetDirectory $ArtifactsDirectory -GdnFolder $gdnFolder -ToolsList $ArtifactToolsList -AzureDevOpsAccessToken $AzureDevOpsAccessToken -UpdateBaseline $UpdateBaseline -GuardianLoggerLevel $GuardianLoggerLevel -CrScanAdditionalRunConfigParams $CrScanAdditionalRunConfigParams -PoliCheckAdditionalRunConfigParams $PoliCheckAdditionalRunConfigParams |
|||
} |
|||
if ($SourceToolsList -and $SourceToolsList.Count -gt 0) { |
|||
& $(Join-Path $PSScriptRoot "run-sdl.ps1") -GuardianCliLocation $guardianCliLocation -WorkingDirectory $ArtifactsDirectory -TargetDirectory $SourceDirectory -GdnFolder $gdnFolder -ToolsList $SourceToolsList -AzureDevOpsAccessToken $AzureDevOpsAccessToken -UpdateBaseline $UpdateBaseline -GuardianLoggerLevel $GuardianLoggerLevel -CrScanAdditionalRunConfigParams $CrScanAdditionalRunConfigParams -PoliCheckAdditionalRunConfigParams $PoliCheckAdditionalRunConfigParams |
|||
} |
|||
|
|||
if ($UpdateBaseline) { |
|||
& (Join-Path $PSScriptRoot "push-gdn.ps1") -Repository $RepoName -BranchName $BranchName -GdnFolder $GdnFolder -AzureDevOpsAccessToken $AzureDevOpsAccessToken -PushReason "Update baseline" |
|||
} |
|||
|
|||
if ($TsaPublish) { |
|||
if ($TsaBranchName -and $BuildNumber) { |
|||
if (-not $TsaRepositoryName) { |
|||
$TsaRepositoryName = "$($Repository)-$($BranchName)" |
|||
} |
|||
Write-Host "$guardianCliLocation tsa-publish --all-tools --repository-name `"$TsaRepositoryName`" --branch-name `"$TsaBranchName`" --build-number `"$BuildNumber`" --codebase-name `"$TsaCodebaseName`" --notification-alias `"$TsaNotificationEmail`" --codebase-admin `"$TsaCodebaseAdmin`" --instance-url `"$TsaInstanceUrl`" --project-name `"$TsaProjectName`" --area-path `"$TsaBugAreaPath`" --iteration-path `"$TsaIterationPath`" --working-directory $SourceDirectory --logger-level $GuardianLoggerLevel" |
|||
& $guardianCliLocation tsa-publish --all-tools --repository-name "$TsaRepositoryName" --branch-name "$TsaBranchName" --build-number "$BuildNumber" --codebase-name "$TsaCodebaseName" --notification-alias "$TsaNotificationEmail" --codebase-admin "$TsaCodebaseAdmin" --instance-url "$TsaInstanceUrl" --project-name "$TsaProjectName" --area-path "$TsaBugAreaPath" --iteration-path "$TsaIterationPath" --working-directory $ArtifactsDirectory --logger-level $GuardianLoggerLevel |
|||
if ($LASTEXITCODE -ne 0) { |
|||
Write-Host "Guardian tsa-publish failed with exit code $LASTEXITCODE." |
|||
exit $LASTEXITCODE |
|||
} |
|||
} else { |
|||
Write-Host "Could not publish to TSA -- not all required values ($$TsaBranchName, $$BuildNumber) were specified." |
|||
exit 1 |
|||
} |
|||
} |
|||
@ -0,0 +1,70 @@ |
|||
param( |
|||
[Parameter(Mandatory=$true)][string] $InputPath, # Full path to directory where artifact packages are stored |
|||
[Parameter(Mandatory=$true)][string] $ExtractPath # Full path to directory where the packages will be extracted |
|||
) |
|||
|
|||
$ErrorActionPreference = "Stop" |
|||
Set-StrictMode -Version 2.0 |
|||
$ExtractPackage = { |
|||
param( |
|||
[string] $PackagePath # Full path to a NuGet package |
|||
) |
|||
|
|||
if (!(Test-Path $PackagePath)) { |
|||
Write-PipelineTaskError "Input file does not exist: $PackagePath" |
|||
ExitWithExitCode 1 |
|||
} |
|||
|
|||
$RelevantExtensions = @(".dll", ".exe", ".pdb") |
|||
Write-Host -NoNewLine "Extracting" ([System.IO.Path]::GetFileName($PackagePath)) "... " |
|||
|
|||
$PackageId = [System.IO.Path]::GetFileNameWithoutExtension($PackagePath) |
|||
$ExtractPath = Join-Path -Path $using:ExtractPath -ChildPath $PackageId |
|||
|
|||
Add-Type -AssemblyName System.IO.Compression.FileSystem |
|||
|
|||
[System.IO.Directory]::CreateDirectory($ExtractPath); |
|||
|
|||
try { |
|||
$zip = [System.IO.Compression.ZipFile]::OpenRead($PackagePath) |
|||
|
|||
$zip.Entries | |
|||
Where-Object {$RelevantExtensions -contains [System.IO.Path]::GetExtension($_.Name)} | |
|||
ForEach-Object { |
|||
$TargetFile = Join-Path -Path $ExtractPath -ChildPath $_.Name |
|||
|
|||
[System.IO.Compression.ZipFileExtensions]::ExtractToFile($_, $TargetFile, $true) |
|||
} |
|||
} |
|||
catch { |
|||
|
|||
} |
|||
finally { |
|||
$zip.Dispose() |
|||
} |
|||
} |
|||
function ExtractArtifacts { |
|||
if (!(Test-Path $InputPath)) { |
|||
Write-Host "Input Path does not exist: $InputPath" |
|||
ExitWithExitCode 0 |
|||
} |
|||
$Jobs = @() |
|||
Get-ChildItem "$InputPath\*.nupkg" | |
|||
ForEach-Object { |
|||
$Jobs += Start-Job -ScriptBlock $ExtractPackage -ArgumentList $_.FullName |
|||
} |
|||
|
|||
foreach ($Job in $Jobs) { |
|||
Wait-Job -Id $Job.Id | Receive-Job |
|||
} |
|||
} |
|||
|
|||
try { |
|||
Measure-Command { ExtractArtifacts } |
|||
} |
|||
catch { |
|||
Write-Host $_ |
|||
Write-Host $_.Exception |
|||
Write-Host $_.ScriptStackTrace |
|||
ExitWithExitCode 1 |
|||
} |
|||
@ -0,0 +1,48 @@ |
|||
Param( |
|||
[string] $GuardianCliLocation, |
|||
[string] $Repository, |
|||
[string] $BranchName="master", |
|||
[string] $WorkingDirectory, |
|||
[string] $AzureDevOpsAccessToken, |
|||
[string] $GuardianLoggerLevel="Standard" |
|||
) |
|||
|
|||
$ErrorActionPreference = "Stop" |
|||
Set-StrictMode -Version 2.0 |
|||
$LASTEXITCODE = 0 |
|||
|
|||
# Construct basic auth from AzDO access token; construct URI to the repository's gdn folder stored in that repository; construct location of zip file |
|||
$encodedPat = [Convert]::ToBase64String([System.Text.Encoding]::ASCII.GetBytes(":$AzureDevOpsAccessToken")) |
|||
$escapedRepository = [Uri]::EscapeDataString("/$Repository/$BranchName/.gdn") |
|||
$uri = "https://dev.azure.com/dnceng/internal/_apis/git/repositories/sdl-tool-cfg/Items?path=$escapedRepository&versionDescriptor[versionOptions]=0&`$format=zip&api-version=5.0-preview.1" |
|||
$zipFile = "$WorkingDirectory/gdn.zip" |
|||
|
|||
Add-Type -AssemblyName System.IO.Compression.FileSystem |
|||
$gdnFolder = (Join-Path $WorkingDirectory ".gdn") |
|||
Try |
|||
{ |
|||
# We try to download the zip; if the request fails (e.g. the file doesn't exist), we catch it and init guardian instead |
|||
Write-Host "Downloading gdn folder from internal config repostiory..." |
|||
Invoke-WebRequest -Headers @{ "Accept"="application/zip"; "Authorization"="Basic $encodedPat" } -Uri $uri -OutFile $zipFile |
|||
if (Test-Path $gdnFolder) { |
|||
# Remove the gdn folder if it exists (it shouldn't unless there's too much caching; this is just in case) |
|||
Remove-Item -Force -Recurse $gdnFolder |
|||
} |
|||
[System.IO.Compression.ZipFile]::ExtractToDirectory($zipFile, $WorkingDirectory) |
|||
Write-Host $gdnFolder |
|||
} Catch [System.Net.WebException] { |
|||
# if the folder does not exist, we'll do a guardian init and push it to the remote repository |
|||
Write-Host "Initializing Guardian..." |
|||
Write-Host "$GuardianCliLocation init --working-directory $WorkingDirectory --logger-level $GuardianLoggerLevel" |
|||
& $GuardianCliLocation init --working-directory $WorkingDirectory --logger-level $GuardianLoggerLevel |
|||
if ($LASTEXITCODE -ne 0) { |
|||
Write-Error "Guardian init failed with exit code $LASTEXITCODE." |
|||
} |
|||
# We create the mainbaseline so it can be edited later |
|||
Write-Host "$GuardianCliLocation baseline --working-directory $WorkingDirectory --name mainbaseline" |
|||
& $GuardianCliLocation baseline --working-directory $WorkingDirectory --name mainbaseline |
|||
if ($LASTEXITCODE -ne 0) { |
|||
Write-Error "Guardian baseline failed with exit code $LASTEXITCODE." |
|||
} |
|||
& $(Join-Path $PSScriptRoot "push-gdn.ps1") -Repository $Repository -BranchName $BranchName -GdnFolder $gdnFolder -AzureDevOpsAccessToken $AzureDevOpsAccessToken -PushReason "Initialize gdn folder" |
|||
} |
|||
@ -0,0 +1,4 @@ |
|||
<?xml version="1.0" encoding="utf-8"?> |
|||
<packages> |
|||
<package id="Microsoft.Guardian.Cli" version="0.7.1"/> |
|||
</packages> |
|||
@ -0,0 +1,51 @@ |
|||
Param( |
|||
[string] $Repository, |
|||
[string] $BranchName="master", |
|||
[string] $GdnFolder, |
|||
[string] $AzureDevOpsAccessToken, |
|||
[string] $PushReason |
|||
) |
|||
|
|||
$ErrorActionPreference = "Stop" |
|||
Set-StrictMode -Version 2.0 |
|||
$LASTEXITCODE = 0 |
|||
|
|||
# We create the temp directory where we'll store the sdl-config repository |
|||
$sdlDir = Join-Path $env:TEMP "sdl" |
|||
if (Test-Path $sdlDir) { |
|||
Remove-Item -Force -Recurse $sdlDir |
|||
} |
|||
|
|||
Write-Host "git clone https://dnceng:`$AzureDevOpsAccessToken@dev.azure.com/dnceng/internal/_git/sdl-tool-cfg $sdlDir" |
|||
git clone https://dnceng:$AzureDevOpsAccessToken@dev.azure.com/dnceng/internal/_git/sdl-tool-cfg $sdlDir |
|||
if ($LASTEXITCODE -ne 0) { |
|||
Write-Error "Git clone failed with exit code $LASTEXITCODE." |
|||
} |
|||
# We copy the .gdn folder from our local run into the git repository so it can be committed |
|||
$sdlRepositoryFolder = Join-Path (Join-Path (Join-Path $sdlDir $Repository) $BranchName) ".gdn" |
|||
if (Get-Command Robocopy) { |
|||
Robocopy /S $GdnFolder $sdlRepositoryFolder |
|||
} else { |
|||
rsync -r $GdnFolder $sdlRepositoryFolder |
|||
} |
|||
# cd to the sdl-config directory so we can run git there |
|||
Push-Location $sdlDir |
|||
# git add . --> git commit --> git push |
|||
Write-Host "git add ." |
|||
git add . |
|||
if ($LASTEXITCODE -ne 0) { |
|||
Write-Error "Git add failed with exit code $LASTEXITCODE." |
|||
} |
|||
Write-Host "git -c user.email=`"dn-bot@microsoft.com`" -c user.name=`"Dotnet Bot`" commit -m `"$PushReason for $Repository/$BranchName`"" |
|||
git -c user.email="dn-bot@microsoft.com" -c user.name="Dotnet Bot" commit -m "$PushReason for $Repository/$BranchName" |
|||
if ($LASTEXITCODE -ne 0) { |
|||
Write-Error "Git commit failed with exit code $LASTEXITCODE." |
|||
} |
|||
Write-Host "git push" |
|||
git push |
|||
if ($LASTEXITCODE -ne 0) { |
|||
Write-Error "Git push failed with exit code $LASTEXITCODE." |
|||
} |
|||
|
|||
# Return to the original directory |
|||
Pop-Location |
|||
@ -0,0 +1,67 @@ |
|||
Param( |
|||
[string] $GuardianCliLocation, |
|||
[string] $WorkingDirectory, |
|||
[string] $TargetDirectory, |
|||
[string] $GdnFolder, |
|||
[string[]] $ToolsList, |
|||
[string] $UpdateBaseline, |
|||
[string] $GuardianLoggerLevel="Standard", |
|||
[string[]] $CrScanAdditionalRunConfigParams, |
|||
[string[]] $PoliCheckAdditionalRunConfigParams |
|||
) |
|||
|
|||
$ErrorActionPreference = "Stop" |
|||
Set-StrictMode -Version 2.0 |
|||
$LASTEXITCODE = 0 |
|||
|
|||
# We store config files in the r directory of .gdn |
|||
Write-Host $ToolsList |
|||
$gdnConfigPath = Join-Path $GdnFolder "r" |
|||
$ValidPath = Test-Path $GuardianCliLocation |
|||
|
|||
if ($ValidPath -eq $False) |
|||
{ |
|||
Write-Host "Invalid Guardian CLI Location." |
|||
exit 1 |
|||
} |
|||
|
|||
foreach ($tool in $ToolsList) { |
|||
$gdnConfigFile = Join-Path $gdnConfigPath "$tool-configure.gdnconfig" |
|||
$config = $False |
|||
Write-Host $tool |
|||
# We have to manually configure tools that run on source to look at the source directory only |
|||
if ($tool -eq "credscan") { |
|||
Write-Host "$GuardianCliLocation configure --working-directory $WorkingDirectory --tool $tool --output-path $gdnConfigFile --logger-level $GuardianLoggerLevel --noninteractive --force --args `" TargetDirectory : $TargetDirectory `" $(If ($CrScanAdditionalRunConfigParams) {$CrScanAdditionalRunConfigParams})" |
|||
& $GuardianCliLocation configure --working-directory $WorkingDirectory --tool $tool --output-path $gdnConfigFile --logger-level $GuardianLoggerLevel --noninteractive --force --args " TargetDirectory : $TargetDirectory " $(If ($CrScanAdditionalRunConfigParams) {$CrScanAdditionalRunConfigParams}) |
|||
if ($LASTEXITCODE -ne 0) { |
|||
Write-Host "Guardian configure for $tool failed with exit code $LASTEXITCODE." |
|||
exit $LASTEXITCODE |
|||
} |
|||
$config = $True |
|||
} |
|||
if ($tool -eq "policheck") { |
|||
Write-Host "$GuardianCliLocation configure --working-directory $WorkingDirectory --tool $tool --output-path $gdnConfigFile --logger-level $GuardianLoggerLevel --noninteractive --force --args `" Target : $TargetDirectory `" $(If ($PoliCheckAdditionalRunConfigParams) {$PoliCheckAdditionalRunConfigParams})" |
|||
& $GuardianCliLocation configure --working-directory $WorkingDirectory --tool $tool --output-path $gdnConfigFile --logger-level $GuardianLoggerLevel --noninteractive --force --args " Target : $TargetDirectory " $(If ($PoliCheckAdditionalRunConfigParams) {$PoliCheckAdditionalRunConfigParams}) |
|||
if ($LASTEXITCODE -ne 0) { |
|||
Write-Host "Guardian configure for $tool failed with exit code $LASTEXITCODE." |
|||
exit $LASTEXITCODE |
|||
} |
|||
$config = $True |
|||
} |
|||
|
|||
Write-Host "$GuardianCliLocation run --working-directory $WorkingDirectory --tool $tool --baseline mainbaseline --update-baseline $UpdateBaseline --logger-level $GuardianLoggerLevel --config $gdnConfigFile $config" |
|||
if ($config) { |
|||
& $GuardianCliLocation run --working-directory $WorkingDirectory --tool $tool --baseline mainbaseline --update-baseline $UpdateBaseline --logger-level $GuardianLoggerLevel --config $gdnConfigFile |
|||
if ($LASTEXITCODE -ne 0) { |
|||
Write-Host "Guardian run for $tool using $gdnConfigFile failed with exit code $LASTEXITCODE." |
|||
exit $LASTEXITCODE |
|||
} |
|||
} else { |
|||
& $GuardianCliLocation run --working-directory $WorkingDirectory --tool $tool --baseline mainbaseline --update-baseline $UpdateBaseline --logger-level $GuardianLoggerLevel |
|||
if ($LASTEXITCODE -ne 0) { |
|||
Write-Host "Guardian run for $tool failed with exit code $LASTEXITCODE." |
|||
exit $LASTEXITCODE |
|||
} |
|||
} |
|||
} |
|||
|
|||
Some files were not shown because too many files changed in this diff
Loading…
Reference in new issue